US20170303119A1 - Information processing system, method of obtaining monitor information, and sensor device - Google Patents
Information processing system, method of obtaining monitor information, and sensor device Download PDFInfo
- Publication number
- US20170303119A1 US20170303119A1 US15/431,943 US201715431943A US2017303119A1 US 20170303119 A1 US20170303119 A1 US 20170303119A1 US 201715431943 A US201715431943 A US 201715431943A US 2017303119 A1 US2017303119 A1 US 2017303119A1
- Authority
- US
- United States
- Prior art keywords
- token
- sensor device
- information
- encryption key
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 45
- 238000000034 method Methods 0.000 title claims description 41
- 238000004891 communication Methods 0.000 claims description 101
- 238000005259 measurement Methods 0.000 description 84
- 238000012545 processing Methods 0.000 description 60
- 238000010586 diagram Methods 0.000 description 24
- 230000008569 process Effects 0.000 description 23
- 230000036760 body temperature Effects 0.000 description 11
- 230000004044 response Effects 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- 230000036772 blood pressure Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000036541 health Effects 0.000 description 3
- 238000012800 visualization Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 230000000474 nursing effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000003745 diagnosis Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 210000000707 wrist Anatomy 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H40/00—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
- G16H40/60—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices
- G16H40/67—ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G06F19/322—
-
- G06F19/3418—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/33—Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/47—Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
Definitions
- the embodiments discussed herein are related to an information processing system, a method of obtaining monitor information, and a sensor device.
- a system in which, for health maintenance and management, information related to a state of a user is acquired from a sensor and is stored in a database coupled to a communication line, the information stored in the database is read out by a terminal device of the user, and thus, health management or the like is performed has been known.
- a mobile terminal device that acquires biological information, such as body temperature, blood pressure, or the like, of a user using a sensor that is capable of communicating with a mobile terminal, encrypts the acquired biological information using a public key that corresponds to a secret key provided to the mobile terminal, and transmits the information to the database has been known.
- an information processing system includes an information processing device including a memory and a processor coupled to the memory, an electronic tag configured to store first identification information used for identifying a monitor target, and a sensor device configured to acquire first monitor information of the monitor target, wherein the processor is configured to transmit, to the sensor device and a server device, a first encryption key corresponding to the first identification information, and transmit, to the sensor device and a server device, second identification information used for identifying the first encryption key, and the sensor device is configured to acquire the first identification information from the electronic tag, encrypt the first monitor information using the first encryption key that corresponds to the first identification information, and transmit, to the server device, the encrypted first monitor information and the second identification information.
- FIG. 1 is a diagram illustrating an example of a system configuration
- FIG. 2 is a diagram illustrating an example of a hardware configuration of a sensor device
- FIG. 3 is a diagram illustrating an example of a hardware configuration of a token management terminal
- FIG. 4 is a diagram illustrating an example of a hardware configuration of a computer included in a cloud server
- FIG. 5 is an exemplary functional block diagram illustrating processing that is executed by a sensor device, a token management terminal, and a cloud server according to a first embodiment
- FIG. 6 is a diagram illustrating an example of control information stored in a sensor device, a token management terminal, and a cloud server according to the first embodiment
- FIG. 7 is a diagram illustrating an example of processing of transmitting monitor information acquired by a sensor device to a cloud server
- FIG. 8 is a diagram illustrating an example of a sequence in which monitor information is acquired using a sensor device and is transmitted to a cloud server;
- FIG. 9 is a flowchart illustrating an example of processing that is performed by a sensor device
- FIG. 10 is a flowchart illustrating an example of processing that is performed by a token management terminal
- FIG. 11 is a flowchart illustrating an example of processing that is performed by a cloud server
- FIG. 12 is a diagram illustrating an example of a token storage unit and a token management table in a second embodiment
- FIG. 13 is a flowchart illustrating an example of processing that is performed by a sensor device in the second embodiment
- FIG. 14 is a flowchart illustrating an example of processing that is performed by a token management terminal according to the second embodiment
- FIG. 15 is a diagram illustrating another example of a hardware configuration of a sensor device.
- FIG. 16 is a diagram illustrating an example of a sequence when a cloud server issues a token (a token ID and an encryption key) which corresponds to a user.
- a mobile terminal that has received the measurement data from a sensor device performs a communication with a database using an encryption key specific to the mobile terminal, and thus, confidentiality of measured private information from a data transmission user is maintained.
- a device such as a mobile phone, which generates a strong electric wave, adversely affects medical devices.
- it is not realistic to prepare an individual mobile phone for each patient. Therefore, it is conceivable to install, in a facility, such as a hospital or the like, a gateway that performs a short-range wireless communication with a weak electric wave in each room and thus perform a wireless communication between a sensor device and the gateway.
- a wireless communication used for performing a communication between devices in a short range for example, a communication method, such as Bluetooth (registered trademark), wireless fidelity (WiFi), or the like, in which an encrypted communication is established by performing paring processing of exchanging an encryption key, is used. Therefore, it is conceivable to mount a communication interface that is capable of performing an encrypted communication in the sensor device and thus perform an encrypted communication between the gateway coupled to a network and the sensor device.
- a communication method such as Bluetooth (registered trademark), wireless fidelity (WiFi), or the like, in which an encrypted communication is established by performing paring processing of exchanging an encryption key
- paring processing is performed by inputting the same number to both of devices that perform a communication with one another, tapping, if in a communication with a smart phone, or the like. If paring is performed only once between the sensor device and the gateway, no big problem arises but, if various sensors are used in a plurality of hospital rooms and for a plurality of patients, a problem arises in which it takes labor and time for setup for performing a communication. Therefore, it is desirable to safely transmit measurement data to a server using a wireless communication line that does not perform paring processing used for encrypting a communication.
- FIG. 1 is a diagram illustrating an example of a system configuration according to a first embodiment.
- a hospital 10 a medical center 11 , and a nursing home 12 are coupled to a cloud server 30 via a network 40 .
- the hospital 10 , the medical center 11 , and the nursing home 12 are examples of a facility which acquires various types of biological information from a monitor target, such as a patient or the like, and this embodiment may be applied to some other facility.
- the cloud server 30 is a server that provides a so-called cloud service, and is a server device that is coupled to a network environment and performs processing on received data or request.
- the hospital 10 has a plurality of hospital rooms 20 and, in each hospital room, a plurality of patients has a medical treatment or a medical examination.
- biological information such as body temperature, blood pressure, pulse, or electro cardiogram, of each of the plurality of patients is regularly measured by a nurse using a sensor device 100 .
- the patient is an example of monitor targets and biological information measured from each patient is an example of monitor information.
- the sensor device 100 encrypts the measurement data, such as body temperature or the like, of each patient, which has been measured in order to conceal the measurement data and thus transmit the concealed data to a cloud server 30 .
- a token management terminal 200 is, for example, a terminal device that is carried by a nurse or the like who performs a measurement for each patient and generates a token including an encryption key used for encrypting measurement data and a token ID that is key identification information used for identifying the encryption key.
- a gateway (GW) 120 used for performing a communication with the cloud server 30 via the network 40 is installed in each of the hospital rooms 20 .
- the sensor device 100 and the gateway 120 are coupled with one another via a wireless communication line, such as Bluetooth Low Energy (BLE) or the like, and the sensor device 100 and the token management terminal 200 are coupled with one another via a wireless communication line, such as Bluetooth Low Energy (BLE) or the like.
- the token management terminal 200 is coupled to a wireless access point (AP) 140 and a gateway (GW) 130 via a communication line, such as wireless fidelity (WiFi) or the like.
- AP wireless access point
- GW gateway
- An NFC tag 110 is a device that stores tag data, such as a user ID or the like, which is identification information set for each patient.
- tag data such as a user ID or the like, which is identification information set for each patient.
- the token management terminal 200 generates a token used for encrypting measurement data for each of the user IDs of the patients in accordance with a token generation request from the sensor device 100 , an operation of a nurse, or the like.
- the token management terminal 200 notifies the cloud server 30 of the generated token via the wireless AP 140 and the gateway 130 . Also, the token management terminal 200 notifies the sensor device 100 of the generated token.
- the sensor device 100 performs measurement for a patient using a sensor, such as a thermometer or the like.
- the sensor device 100 encrypts biological data measured from the patient using a token received from the token management terminal 200 and transmits the encrypted biological data to the cloud server 30 via the gateway 120 .
- the cloud server 30 decrypts the encrypted data transmitted from the sensor device 100 using the token notified from the token management terminal 200 in advance.
- the cloud server 30 processes the measurement data of the patient, which has been decrypted, such that the measurement data may be visualized, and stores the processed data in a database 310 .
- the measurement data stored in the database 310 is used for health management performed by the patient or for diagnosis by a doctor.
- FIG. 2 is a diagram illustrating an example of a hardware configuration of the sensor device 100 .
- the sensor device 100 includes a micro-processing unit (MPU) 101 , memory 102 , a first sensor 103 , a second sensor 104 , a BLE interface circuit 105 , an NFC interface circuit 106 , and a nonvolatile memory 107 .
- the MPU 101 is coupled to another circuit, such as the memory 102 or the like, in the sensor device 100 via a bus 108 .
- the MPU 101 is an example of a processor that executes various types of processing which are performed by the sensor device 100 , and is a hardware circuit.
- a hardware circuit such as a central processing unit (CPU), a field programmable gate array (FPGA), a sequencer circuit, or the like, may be also used.
- the memory 102 is a storage device, such as random access memory (RAM) or the like.
- the memory 102 temporarily stores a program that is executed by the MPU 101 or measurement data measured by the sensor device 100 .
- the MPU 101 executes the program stored in the memory 102 , and thereby, each of the various types of processing which are performed by the sensor device 100 , which will be described later, is executed.
- Each of the first sensor 103 and the second sensor 104 is, for example, a sensor that is used for measuring biological information, such as body temperature, blood pressure, or the like of each patient.
- the sensors 103 and 104 include a thermometer, a sphygmomanometer, a pulse rate meter, a sensor that measures an electrocardiogram, and the like.
- FIG. 2 an example in which two sensors, that is, the first sensor and the second sensor, are mounted in the sensor device 100 is illustrated as an example but, only a single sensor may be mounted therein, and also, three or more sensors may be mounted therein.
- the BLE interface circuit 105 is an interface circuit through which the sensor device 100 performs a communication with the gateway 120 or the token management terminal 200 via a BLE wireless communication line.
- the NFC interface circuit 106 is an interface circuit through which the sensor device 100 acquires tag data from the NFC tag 110 using an NFC short-range wireless communication.
- the NFC interface circuit 106 is an example of the NFC tag reader.
- the nonvolatile memory 107 is a storage circuit that is used for storing a program that is executed by the MPU 101 .
- the nonvolatile memory 107 may be also used for storing the user ID that is identification information of each patient and a token used for encrypting data measured from each patient.
- FIG. 3 is a diagram illustrating an example of a hardware configuration of the token management terminal 200 .
- the token management terminal 200 includes a CPU 201 , memory 202 , a solid state disk (SSD) 203 , a BLE interface circuit 204 , a WiFi interface circuit 205 , an NFC interface circuit 206 , and an input and output device interface circuit 207 .
- the CPU 201 is coupled to another component, such as the memory 202 or the like, via a bus 208 .
- the CPU 201 is an example of a hardware circuit of a processor that executes various types of processing which are performed by the token management terminal 200 .
- a hardware circuit such as a field programmable gate array (FPGA), a sequencer circuit, or the like, may be also used.
- FPGA field programmable gate array
- the memory 202 is a storage device, such as RAM or the like.
- the memory 202 stores a program that is executed by the CPU 201 , or a token including an encryption key that is used by the sensor device 100 when the sensor device 100 encrypts measurement data and a token ID that is key identification information used for identifying the encryption key.
- the memory 202 stores a user ID that is identification information of a patient and information related to a sensor device used for measuring biological information of the patient in association with each token.
- the CPU 201 executes a program stored in the memory 202 , and thereby, each of the various types of processing which are performed by the token management terminal 200 , which will be described later, is executed.
- the SSD 203 is a nonvolatile storage circuit used for storing data, such as a program that is executed by the token management terminal 200 , or the like.
- the SSD 203 may be also used for storing identification information of each patient, a token (an encryption key and a token ID) which corresponds to each patient, and information related to a sensor device that is used for measuring biological information of each patient.
- the BLE interface circuit 204 is an interface circuit through which the token management terminal 200 performs a communication with the sensor device 100 or the gateway 120 in each hospital room via the BLE wireless communication line.
- the WiFi interface circuit 205 is an interface circuit through which the token management terminal 200 performs a communication with the wireless AP 140 via a WiFi wireless communication line.
- the NFC interface circuit 206 is an interface circuit through which the token management terminal 200 acquires tag data from the NFC tag 110 of a patient using an NFC short-range wireless communication.
- the NFC interface circuit 206 is an example of the NFC tag reader.
- the input and output device interface circuit 207 is an interface circuit couples various input and output devices, such as a touch pad input, a display output, or the like, which are used for processing that is performed in the token management terminal 200 .
- FIG. 4 is a diagram illustrating an example of a hardware configuration of a computer 300 included in the cloud server 30 .
- the computer 300 includes a CPU 301 , memory 302 , a hard disk drive (HDD) 303 , a network interface circuit 304 , a database (DB) interface circuit 305 , and an input and output device interface circuit 306 .
- HDD hard disk drive
- DB database interface circuit
- the CPU 301 is an example of a hardware circuit of a processor that performs various types of processing of the cloud server 30 on the computer 300 , and one of electronic parts that constitute the computer 300 .
- the computer 300 includes a single CPU 301
- the number of CPUs is not limited to one but the computer 300 may include a plurality of CPUs.
- the CPU 301 may include a plurality of CPU cores and a hardware thread, and a CPU that is capable of performing processing of processes of a plurality of applications in parallel by the single CPU itself may be used as the CPU 301 .
- the memory 302 is a storage device, such as RAM or the like.
- the memory 302 stores a program that is executed by the CPU 301 or data that is to be a target that is processed by the computer 300 .
- the CPU 301 executes a program stored in the memory 302 , and thereby, each of the various types of processing which are performed by the computer 300 , which will be described later, is executed.
- the hard disk drive (HDD) 303 is a nonvolatile storage medium that stores a program that is executed by the CPU 301 or data that is handled by processing that is executed on the CPU 301 .
- the network interface circuit 304 is an interface circuit through which the computer 300 performs a communication with another device via the network 40 .
- the database (DB) interface circuit 305 is an interface circuit that is used for performing a communication with the database 310 .
- the database (DB) 310 is a database device that stores data related to processing that is performed in the cloud server 30 , and stores an operating system (OS) that is executed on the cloud server 30 , data used by an application, or the like.
- the DB 310 stores various types of data, such as measurement data of each patient, which have been received via a network.
- a DB sever 310 is realized by a storage device, a server including a large capacity storage device, or the like.
- the input and output device interface circuit 306 is a circuit that is used for controlling, when a peripheral device, such as a mouse, a keyboard, or the like, is coupled to the computer 300 , input and output to and from the peripheral device.
- a peripheral device such as a mouse, a keyboard, or the like
- FIG. 5 is an exemplary functional block diagram illustrating processing that is executed by the sensor device 100 , the token management terminal 200 , and the cloud server 30 according to the first embodiment.
- the sensor device 100 executes a sensor application program including each processing of an NFC communication unit 151 , a BLE communication unit 152 , a management unit 153 , a data processing unit 154 , and a connection determination unit 155 .
- the MPU 101 executes a predetermined program stored in the memory 102 or the nonvolatile memory 107 , and thereby, the sensor application program is executed.
- the NFC communication unit 151 controls the NFC interface circuit 106 and reads out a user ID that identifies a patient (a user) from the NFC tag 110 worn by the patient via the NFC short-range wireless communication line.
- the BLE communication unit 152 controls the BLE interface circuit 105 and communicates with the token management terminal 200 or the gateway 120 via the BLE wireless communication line.
- the management unit 153 controls overall processing in the sensor device 100 .
- the management unit 153 performs a communication with the NFC tag 110 or the token management terminal 200 using the NFC communication unit 151 and the BLE communication unit 152 and manages a token generated by the token management terminal 200 .
- the data processing unit 154 encrypts measurement data measured from a patient (a user) by the sensor 103 using an encryption key generated for the user ID and generates transmission data including the encrypted data and the token ID that is used for identifying the encryption key.
- the transmission data that is, the encrypted measurement data and the token ID, which has been generated by the data processing unit 154 , is transmitted to the gateway 120 by the BLE communication unit 152 , and then, is transmitted to the cloud server 30 via the gateway 120 .
- an encryption key in accordance with a so-called public key cryptosystem may be used.
- the common key cryptosystem is an encryption method in which a “key” that is used by a device that performs encryption and a “key” that is used by a device that performs decryption are the same key.
- An encryption key may be generated by an arbitrary method and, for example, may be generated by generating a random number of a predetermined bit number.
- the token ID is identification information that is used for identifying the generated encryption key, and may be generated by an arbitrary method. For example, each time an encryption key is generated, a token ID may be generated by generating a random number.
- the token including the encryption key and the token ID is used in common in processing of encrypting data and processing of decrypting the encrypted data.
- a new token may be generated and used for encryption and decryption of the measured data.
- a new token is used each time data is measured, and thereby, it is enabled to encrypt measurement data and thus transmit the measurement data more safely.
- the connection determination unit 155 determines whether or not it is possible to execute a communication with the token management terminal 200 using the BLE communication unit 152 at the time when the sensor device 100 is used or on a regular basis.
- the connection determination unit 155 stores a result of determination on whether or not it is possible to execute a communication with the token management terminal 200 , as information indicating “STATE” in a management terminal connection state table 170 which will be described later.
- the token management terminal 200 includes an NFC communication unit 251 , a BLE communication unit 252 , a WiFi communication unit 253 , and a management unit 254 and executes an application program that performs token management.
- the CPU 201 executes a program stored in the memory 202 or the SSD 203 , and thereby, the application program that performs token management is executed.
- the NFC communication unit 251 controls the NFC interface circuit 206 and reads out a user ID that identifies a patient from the NFC tag 110 worn by the patient via the NFC short-range wireless communication line.
- the BLE communication unit 252 controls the BLE interface circuit 204 and communicates with the sensor device 100 or the gateway 120 via the BLE wireless communication line.
- the WiFi communication unit 253 controls the WiFi interface circuit 205 and communicates with the wireless AP 140 via the WiFi wireless communication line.
- the management unit 254 controls overall processing in the token management terminal 200 .
- the management unit 254 When the user ID that identifies the patient is acquired from the NFC tag of the patient by the NFC communication unit 251 , the management unit 254 generates a token including an encryption key that corresponds to the acquired user ID and a token ID that is identification information that uniquely specifies the encryption key.
- the management unit 254 coupes to the wireless AP 140 using the WiFi communication unit 253 and transmits the generated token to the cloud server 30 via the wireless AP 140 and the gateway 130 . Also, the management unit 254 transmits the generated token to the sensor device 100 using the BLE communication unit 252 .
- the cloud server 30 includes a communication unit 351 , a management unit 352 , and a data processing unit 353 and executes an application program of a cloud service.
- the CPU 301 executes a program stored in the memory 302 or the HDD 303 , and thereby, the application program of the cloud service is executed.
- the communication unit 351 performs a communication with another device via the network 40 in accordance with a TCP/IP protocol.
- a device of a communication partner supports Secure Sockets Layer (SSL)
- the communication unit 351 performs an encrypted communication using SSL with the device of the communication partner.
- the management unit 352 performs management of a token that is received from the token management terminal 200 .
- the data processing unit 353 decrypts the encrypted measurement data that is received from the sensor device 100 using a corresponding encryption key included in a token that has been received in advance.
- the data processing unit 353 performs predetermined processing for visualization of data on the decrypted measurement data and stores the measurement data on which the processing has been performed in the database 310 .
- FIG. 6 is a diagram illustrating an example of control information that is stored in the sensor device 100 , the token management terminal 200 , and the cloud server 30 according to the first embodiment.
- the sensor device 100 includes a token storage unit 160 and the management terminal connection state table 170 .
- the token storage unit 160 is a storage unit that stores information (a token ID (tokenID) and an encryption key (key)) of a token that corresponds to a monitor target for which the sensor device 100 performs measurement.
- token ID token ID
- key an encryption key
- the management terminal connection state table 170 is a storage unit that stores information related to “STATE” indicating whether or not the sensor device 100 is coupled to the token management terminal 200 via the BLE wireless communication line or the like.
- information such as, for example, the host name (“tokenMngr1”) of the token management terminal 200 that was coupled to the sensor device 100 last and the address (“23:AB:84:B8:65:C8”) of BLE, is stored.
- the management terminal connection state table 170 for example, a result of determination on whether or not it is possible to couple the connection determination unit 155 to the token management terminal 200 via the BLE wireless communication line on a regular basis is stored.
- the token management terminal 200 the host name of which is “tokenMngr1” is in a state of “UNCOUPLED”.
- the token management terminal 200 includes a token management table 260 .
- the token management table 260 is a storage unit that stores information, such as a token (a token ID (tokenID) and an encryption key (key)) that corresponds to a monitor target on which the sensor device 100 performs a measurement, identification information (a user ID) of a monitor target, a device ID that is used for identifying the sensor device 100 , or the like.
- the encryption key “Key-A” and the token ID “3ef698b” are stored in association with the user ID “User-A” in the token management table 260 .
- information (a device type, a device name, and a device ID) related to the sensor device 100 that performs a measurement for a patient the user ID of which is “User-A” is also stored in association with the user ID “User-A” in the token management table 260 .
- the token management table 260 illustrated in FIG. 6 illustrates an example in which information related to a single user ID is stored, but a plurality of sets of information each of which corresponds to the corresponding one of the user IDs of a plurality of patients, which are simultaneously measured, may be stored therein.
- the cloud server 30 includes a cloud service table 360 .
- the cloud service table 360 is a storage unit that stores a token including an encryption key that is used for decrypting encrypted data which is received from the sensor device 100 and a token ID that is used for identifying the encryption key in association with information, such as a user ID, the device type of the sensor device 100 , or the like.
- the number of pieces of information related to a token that is stored in the cloud service table 360 is not limited to one.
- FIG. 7 is a diagram illustrating an example of processing of transmitting monitor information acquired by a sensor device to a cloud server. Processing illustrated in FIG. 7 is largely divided into three processes. The processing will be specifically described below in accordance with a flow of data.
- the sensor device 100 performs a short-range wireless communication with the NFC tag 110 of a patient that is a measurement target of the sensor by NFC (S 1 ), and reads out a user ID (“user-A”) that is the identification information of the patient from the NFC tag 110 (S 2 ).
- the sensor device 100 transmits a token generation request to the token management terminal 200 via a wireless communication line, such as BLE or the like (S 3 ).
- the sensor device 100 transmits information of a user ID (“user-A”), the device identification information (a device ID) of the sensor that measures data from the patient, or the like, to the token management terminal 200 .
- the token management terminal 200 When the token management terminal 200 receives the token generation request from the sensor device 100 , the token management terminal 200 generates an encryption key (“key-A”) that corresponds to the identification information of the patient, which has been received, and a token ID (“3ef698b”) as key identification information that is used for identifying the encryption key.
- the token management terminal 200 registers the encryption key and token ID that have been generated with the identification information (“user-A”) of the patient, which has been received from the sensor, and information related to the identification information of the sensor, or the like in the token management table 260 .
- the token management terminal 200 transmits a token including the token ID (“3ef698b”) and the encryption key (“key-A”) that have been generated to the cloud server 30 via the wireless AP 140 , the GW 130 , or the like (S 4 ).
- the token management terminal 200 may be configured to transmit, in that case, the user ID (“user-A”) and information related to the type (for example, “THERMOMETER”) of the sensor device that performs a measurement with the token to the cloud server 30 .
- the user ID and the information related to the type of the sensor device may be encrypted with the measurement data and thus be included in the encrypted data that is generated by the sensor device 100 .
- the cloud server 30 responds to the token management terminal 200 , indicating that information, such as the token ID, the encryption key, or the like, which has been received from the token management terminal 200 , has been registered in the cloud service table 360 and has been correctly received.
- the token management terminal 200 receives, from the cloud server 30 , a response indicating that the information has been correctly received, the token management terminal 200 transmits the token ID (“3ef698b”) and the encryption key (“key-A”) that have been generated to the sensor device 100 (S 5 ).
- the sensor device 100 receives, from the token management terminal 200 , the information of the token (the token ID, the encryption key) of the patient that is a measurement target, the sensor device 100 stores the information of the token which has been received in the token storage unit 160 .
- the sensor device 100 measures information, such as body temperature or the like, from the patient using the sensor 103 .
- the sensor device 100 encrypts the measurement data measured from the patient using the encryption key received from the token management terminal 200 and generates encrypted data.
- the sensor device 100 transmits transmission data including the generated encrypted data and the corresponding token ID (“3ef698b”) to the cloud server 30 via the gateway 120 (S 6 ).
- the cloud server 30 When the cloud server 30 receives the encrypted data and the token ID (“3ef698b”), the cloud server 30 acquires the encryption key (“key-A”) that corresponds to the received token ID from the cloud service table 360 . The cloud server 30 decrypts the encrypted data received from the sensor device 100 using the acquired encryption key (“key-A”). The cloud server 30 stores the decrypted measurement data in the database 310 .
- the cloud server 30 may be configured to perform, in that case, processing for visualization, as appropriate, and store the processed data in the database 310 .
- the above-described processing described in (1) and (2) it is enabled to encrypt measurement data measured from a patient using a specific encryption key generated in accordance with a user ID and thus transmit the encrypted measurement data to the cloud server 30 .
- the encrypted measurement data may be decrypted using the specific encryption key that corresponds to the token ID which has been acquired from the token management terminal 200 in advance.
- the measurement data that has been measured from the patient may be safely transmitted to the cloud server 30 .
- a configuration in which, each time the sensor device 100 measures data from a patient, a token generation request is given to the token management terminal 200 , a new token is acquired, and information stored in the token storage unit 160 is updated may be employed.
- a specific token that is used only once is generated each time data is measured from the patient. Therefore, the token storage unit 160 in the first embodiment does not store the user ID and the confidentiality of the measurement data acquired from the patient is increased.
- the token management terminal 200 may be configured to acquire information of the user ID, by processes of S 1 ′ and S 3 ′, instead of the processes of S 1 to S 3 , in processing of token generation and sensor and user linkage illustrated in (1) of FIG. 7 . That is, a configuration in which, instead of processing of reading out the NFC tag 110 performed by the sensor device 100 , the token management terminal 200 reads out the user ID directly from the NFC tag 110 of a patient using the NFC interface circuit 206 may be employed. In this case, the token management terminal 200 links the device ID of the sensor device 100 that measures data of the patient that is a target, among the sensor devices 100 coupled thereto via the BLE communication line at that time, to the user ID.
- a selection screen may be output to a touch panel of the token management terminal 200 and a sensor device 100 that is to be linked may be determined based on a selection result input through the selection screen.
- the token management terminal 200 When the token management terminal 200 acquires the identification information of the user ID from the NFC tag 110 , the token management terminal 200 generates a corresponding token and transmits the token to the sensor device 100 that is used for measuring data of a patient. The sensor device encrypts measurement data using the token acquired from the token management terminal 200 and transmits the encrypted measurement data to the cloud server 30 .
- FIG. 8 is a diagram illustrating an example of a sequence in which monitor information is acquired using a sensor device and is transmitted to a cloud server, and illustrates the contents that have been described with reference to FIG. 7 in a sequence diagram.
- Each of processes of S 1 to S 6 in FIG. 8 corresponds to the corresponding one of the processes of S 1 to S 6 illustrated in FIG. 7 .
- the sensor device 100 performs a short-range wireless communication using the NFC tag 110 mounted in a medical band worn by a patient and NFC (S 1 ) and acquires information of the user ID (“user-A”) from the NFC tag 110 (S 2 ).
- the sensor device 100 transmits a token generation request with the acquired information of the user ID to the token management terminal 200 (S 3 ).
- the sensor device 100 may be configured to transmit, in that case, the device ID that identifies the self-device with the token generation request to the token management terminal 200 .
- the token management terminal 200 generates a token including an encryption key and a token ID that correspond to the user ID.
- the token management terminal 200 transmits the generated token with the user ID and the information of the sensor to the cloud server 30 (S 4 ).
- the token management terminal 200 performs a communication with the cloud server 30 by performing an encrypted communication, such as SSL or the like, and notifies the cloud server 30 of the information of the user ID.
- the token management terminal 200 When the token management terminal 200 receives a response from the cloud server 30 , the token management terminal 200 transmits the generated token to the sensor device 100 (S 5 ). In that case, the token management terminal 200 transmits the generated token with information (for example, the device ID) that identifies the sensor device 100 of a destination.
- information for example, the device ID
- the sensor device 100 encrypts measurement data measured from the patient using the encryption key included in the token received from the token management terminal 200 and transmits the encrypted data with the token ID to the cloud server 30 (S 6 ).
- data such as, for example, an electro cardiogram or the like
- regularly measured data is encrypted using the same encryption key and the encrypted data is transmitted with the token ID to the cloud server 30 .
- FIG. 9 is a flowchart illustrating an example of processing that is performed by a sensor device.
- the sensor device 100 receives a message from the NFC tag 110 or the token management terminal 200 via the NFC communication line or the BLE communication line (S 101 ).
- the sensor device 100 determines whether or not the received message is a message that has been received from the NFC tag 110 (S 102 ). If the received message is not a message that has been received from the NFC tag 110 (NO in S 102 ), the sensor device 100 determines whether or not the received message is a token that has been transmitted from the token management terminal 200 to the self-device (S 103 ). If the received message is not a token that has been transmitted to the self-device (NO in S 103 ), it is assumed that the received message is not a message that is to be processed by the sensor device 100 , the process returns to S 101 , and the sensor device 100 waits until receiving a next message.
- the sensor device 100 transmits a token generation request with the received information of the user ID to the token management terminal 200 (S 104 ). Then, the sensor device 100 waits until a token that corresponds to the transmitted token generation request is returned from the token management terminal 200 (NO in S 105 ). When the sensor device 100 receives the generated token from the token management terminal 200 (YES in S 105 ), the process proceeds to S 106 . On the other hand, also, if the message received by the sensor device 100 is a token that has been received from the token management terminal 200 (YES in S 103 ), the process proceeds to Step S 106 .
- the token (the encryption key, the token ID) that has been received from the token management terminal 200 is stored (registered) in the token storage unit 160 .
- the sensor device 100 performs a measurement of the body temperature or the like from the patient using the sensor 103 (S 107 ).
- the sensor device 100 encrypts measurement data acquired by the measurement using the encryption key included in the token that has been received from the token management terminal 200 and generates encrypted data (S 108 ).
- the sensor device 100 transmits the generated encrypted data with the token ID to the cloud server 30 (S 109 ).
- FIG. 10 is a flowchart illustrating an example of processing that is performed by the token management terminal 200 .
- the token management terminal 200 receives a message via the NFC communication line and the BLE communication line (S 201 ).
- the token management terminal 200 determines whether or not the received message is a message that has been received from the NFC tag 110 (S 202 ). If the received message is not a message that has been received from the NFC tag 110 (NO in S 202 ), the token management terminal 200 determines whether or not the received message is a token generation request that has been received from the sensor device 100 (S 203 ). If the received message is not a token generation request either (NO in S 203 ), the token management terminal 200 performs processing in accordance with the received message (S 204 ), and the process proceeds to S 201 .
- the token management terminal 200 If a user ID is received from the NFC tag 110 (YES in S 202 ) or if a token generation request is received from the sensor device 100 (YES in S 203 ), the token management terminal 200 generates a token that corresponds to the received user ID (S 205 ). The token management terminal 200 registers (stores) the generated token (the encryption key, the token ID) in accordance with the received user ID with information, such as the identification information of the sensor device 100 coupled thereto via the BLE line, or the like, in the token management table 260 (S 206 ).
- the token management terminal 200 notifies the cloud server 30 of the token and the information of the sensor device 100 that have been registered in the token management table 260 (S 207 ) and waits until a response from the cloud server 30 is returned (NO in S 208 ).
- the token management table 260 receives a response from the cloud server 30 (YES in S 208 )
- the token management table 260 transmits the generated token (the encryption key, the token ID) to the sensor device 100 (S 209 ).
- FIG. 11 is a flowchart illustrating an example of processing that is performed by the cloud server 30 .
- the cloud server 30 receives a message via the network 40 (S 301 ).
- a message that is received includes, for example, a token registration request that has been generated by the token management terminal 200 or encrypted data that has been generated by the sensor device 100 .
- the cloud server 30 determines whether or not the received message is encrypted data that has been generated by the sensor device 100 (S 302 ). If the received message is not encrypted data (NO in S 302 ), the cloud server 30 determines whether or not the received message is a token registration request that has been generated by the token management terminal 200 (S 303 ). If the received message is not a token registration request either (NO in S 303 ), the process returns to S 301 .
- the cloud server 30 registers information related to a token included in the token registration request in the cloud service table 360 (S 304 ). Then, the cloud server 30 transmits a response indicating that registration of a token is completed to the token management terminal 200 (S 305 ).
- the received message is encrypted data that has been generated by the sensor device 100 (YES in S 302 )
- the token ID that has been received with the encrypted data is acquired from the received message (S 306 ).
- the cloud server 30 acquires information of an encryption key that corresponds to the acquired token ID from the cloud service table 360 (S 307 ). Then, the cloud server 30 decrypts the received encrypted data using the corresponding encryption key (S 308 ).
- the cloud server 30 processes the decrypted measurement data of the patient for visualization, as appropriate (S 309 ), and registers the processed data in the database 310 (S 310 ).
- the token management terminal 200 when biological information, such as body temperature or the like, of a patient is acquired using the sensor device 100 , the token management terminal 200 generates a token (an encryption key, a token ID) that corresponds to a user ID that identifies a patient that is a measurement target separately from identification information of the patient.
- the token management terminal 200 transmits the generated token to both of the cloud server 30 and the sensor device 100 .
- the sensor device 100 encrypts measurement data measured from the patient using the encryption key included in the token and transmits the corresponding token ID, not a user ID that directly specifies the patient, with the encrypted data to the cloud server.
- the cloud server 30 specifies the corresponding encryption key which has been received in advance from the token ID that has been received with the encrypted data and decrypts the received encrypted data using the specified encryption key.
- the measurement data is encrypted using the encryption key that has been generated in accordance with the user ID and the encrypted data and the patient are linked to one another using the token ID that has been generated as separate identification information from the user ID that directly specifies the patient of a measurement target.
- data that has been encrypted in advance may be transmitted, and therefore, it is enabled to safely transmit the data. Therefore, the measurement data may be safely transmitted to the cloud server 30 from the sensor device 100 .
- each time biological information such as body temperature or the like
- a specific token is issued by the token management terminal 200 coupled to the sensor device 100 .
- a different token ID and a different key are used each time measurement data is encrypted and thus transmitted, and therefore, it is enabled to transmit the measurement data more safely.
- FIG. 12 is a diagram illustrating an example of a token storage unit and a token management table according to the second embodiment.
- the sensor device 100 includes a token storage unit 180 and the token management terminal 200 includes a token management table 280 .
- the token storage unit 180 is stored, for example, in the nonvolatile memory 107 .
- the token management table 280 is stored, for example, in the SSD 203 .
- Information of a plurality of token IDs, encryption keys, and user IDs is registered in the token storage unit 180 included in the sensor device 100 .
- the token storage unit 180 stores information of a token ID and an encryption key that was received last from the token management terminal 200 in association with each user ID. If, when the sensor device 100 receives a token from the token management terminal 200 , there is a token associated with a user ID that corresponds to the received token in the token storage unit 180 , the sensor device 100 overwrites an old token with a newly received token. If there is not a token associated with a user ID that corresponds to the received token in the token storage unit 180 , the sensor device 100 adds the received token as a new token to the token storage unit 180 .
- the token management table 280 included in the token management terminal 200 stores information of a newest token issued to each sensor device 100 . If, when the token management terminal 200 generates a new token, there is a token that corresponds to the same user ID in the token management table 280 , the token management terminal 200 overwrites the token and, if not, adds the token as a new token.
- a method for removing information stored in the token storage unit 180 may be performed by various methods. For example, a configuration in which, when the sensor device 100 includes an input device, such as a reset button or the like, a person who uses the sensor device 100 presses the reset button to initialize or remove the information stored in the token storage unit 180 may be employed. Also, a configuration in which information related to a token stored in the token storage unit 180 is removed in accordance with a message of a token removal request that has been received from the token management terminal 200 may be employed. Similarly, a configuration in which, also for information of a token stored in the token management table 280 , information registered in the token management table 280 may be removed based on information input by a person who uses the token management terminal 200 , or the like may be employed.
- FIG. 13 is a flowchart illustrating an example of processing that is performed by a sensor device according to the second embodiment.
- the sensor device 100 receives a message from the NFC tag 110 or the token management terminal 200 via the NFC communication line or the BLE communication line (S 111 ).
- the sensor device 100 determines whether or not the received message is a message that has been received from the NFC tag 110 (S 112 ). If the received message is not a message that has been received from the NFC tag 110 (NO in S 112 ), the sensor device 100 determines whether or not the received message is a token that has been transmitted to the self-device from the token management terminal 200 and received (S 113 ). If the received message is not a token that has been transmitted to the self-device and received (NO in S 113 ), it is assumed that the received message is not a message that is to be processed by the sensor device 100 , the process returns to S 111 , and the sensor device 100 waits until receiving a next message. If the received message is a token that has been transmitted to the self-device and received (YES in S 113 ), the process proceeds to S 117 .
- the connection determination unit 155 refers to the management terminal connection state table 170 and determines whether or not the token management terminal 200 is coupled thereto (S 114 ). If it is determined that the token management terminal 200 is coupled thereto (YES in S 114 ), a token generation request is transmitted with the user ID to the token management terminal 200 (S 115 ).
- the sensor device 100 waits until receiving the generated token from the token management terminal 200 (NO in S 116 ) and, when the sensor device 100 receives the generated token (YES in S 116 ), registers the generated token in the token storage unit 180 (S 117 ). If a token that was generated for the same user ID before is already registered in the token storage unit 180 , the token stored in the token storage unit 180 is overwritten with the token newly received from the token management terminal 200 .
- the sensor device 100 When the generated token is registered in the token storage unit 180 , the sensor device 100 performs a measurement for a measurement target using the sensor 103 (S 118 ). When measurement data is acquired from the measurement target by a measurement, the sensor device 100 encrypts the measurement data using an encryption key included in the token registered in the token storage unit 180 (S 119 ). The sensor device 100 transmits encrypted data acquired by encrypting the measurement data with the token ID included in the token registered in the token storage unit 180 to the cloud server 30 (S 120 ). The BLE communication unit 152 transmits the encrypted data to the gateway 120 and the gateway 120 transmits the encrypted data to the cloud server 30 via the network 40 , thereby performing transmission of the encrypted data.
- the sensor device 100 performs processing of establishing an encrypted communication path with the gateway 120 by the BLE communication unit 152 (S 122 ).
- the processing of establishing an encrypted communication path is performed by, for example, processing of paring in which an encryption key is exchanged, or the like.
- the sensor device 100 performs a measurement using the sensor 103 (S 123 ) and transmits the acquired measurement data to the cloud server 30 via the encrypted communication path that has been established in S 122 (S 124 ).
- FIG. 14 is a flowchart illustrating an example of processing that is performed by a token management terminal according to the second embodiment.
- the token management terminal 200 receives a message via the NFC communication line or the BLE communication line (S 211 ). Also, the token management terminal 200 receives a message related to an operation, or the like, input by an operator via an input device, such as a touch panel or the like (S 211 ).
- the token management terminal 200 determines whether or not the received message is a message that has been received from the NFC tag 110 (S 212 ). If the received message is a user ID that has been received from the NFC tag 110 (YES in S 212 ), the token management terminal 200 generates a new token that corresponds to the received user ID (S 214 ) and registers the generated token in the token management table 280 (S 215 ). If, when the generated token is registered in the token management table 280 , a token that was generated for the same user ID before is stored, the token management terminal 200 overwrites the token that was generated before with the newly generated token.
- the token management terminal 200 When the generated token is registered in the token management table 280 , the token management terminal 200 notifies the cloud server 30 of the generated token (S 216 ) and waits for a response from the cloud server 30 (NO in S 217 ). When the token management terminal 200 receives a response that notifies that the transmitted token has been correctly received at the cloud server 30 (YES in S 217 ), the token management terminal 200 transmits the generated token to the sensor device 100 (S 218 ) and terminates the process.
- the token management terminal 200 determines whether or not the received message is a token generation request (S 213 ). If the received message is a token generation request that has been received with information of the user ID from the sensor device 100 (YES in S 213 ), processing of generating a token that corresponds to the received user ID and transmitting the generated token (S 214 to S 218 ).
- the token management terminal 200 determines whether or not the received message is a token removal request that has been input by the operator of the token management terminal 200 (S 219 ). If the input message is not a token removal request either (NO in S 219 ), processing in accordance with the received message is executed (S 220 ) and the process returns to S 211 .
- the token management terminal 200 performs processing of removing a token requested by the token removal request from the token management table 280 (S 221 ).
- the token removal request includes, for example, information of the token ID or the user ID which is related to a token that is to be a removal target.
- the information of the token ID, the user ID, or the like which is related to a token that is to be a removal target, is input, for example, by an arbitrary method, such as input via the touch panel of the token management terminal 200 , or the like.
- the sensor device 100 when the sensor device 100 according to the second embodiment receives a user ID from the NFC tag 110 , the sensor device 100 checks a connection condition of the token management terminal 200 . If the token management terminal 200 is coupled thereto, the sensor device 100 requests the token management terminal 200 to generate a new token, encrypts measurement data using the newly generated token, and transmits the encrypted data to the cloud server 30 . Accordingly, if the token management terminal 200 is coupled to the sensor device 100 , the sensor device 100 is capable of performing encryption, and thus, transmission of data using a new token at all times and safely transmit measurement data to the cloud server 30 .
- the token management terminal 200 is not coupled to the sensor device 100 , if a token that corresponds to the user ID is stored in the token storage unit 180 , the token stored in the token storage unit 180 is used. In this case, it is possible to encrypt measurement data using a token generated at the time of a measurement in the past and thus transmit the encrypted measurement data to the cloud server 30 .
- the token management terminal 200 In a state where there is not the token management terminal 200 near a person (a nurse or the like) who uses the sensor device 100 , when an emergency patient is transported by an ambulance car or when a first medical examination of a patient is performed, the token management terminal 200 is not capable of generating a token that corresponds to the new patient. Therefore, if there is not the token management terminal 200 near the sensor device 100 , an encrypted communication line with the gateway 120 is established by a method, such as paring or the like, and thereby, the sensor device 100 is enabled to transmit the measurement data to the cloud server 30 .
- the measurement data is transmitted with the identification information of the sensor device 100 to the cloud server 30 and is stored with a reception time of the measurement data in the database 310 at the cloud server 30 side, and thereby, it is possible to check a measurement result later.
- FIG. 15 is a diagram illustrating another example of a hardware configuration of a sensor device.
- a sensor device 100 A of FIG. 15 includes a sensor interface circuit 109 used for coupling to some other sensor than the first sensor 103 and the second sensor 104 .
- a configuration in which the first sensor 103 and the second sensor 104 are not mounted in the sensor device 100 A may be employed.
- the sensor interface circuit 109 is an interface circuit that performs transmission and reception of a signal in accordance with a specific communication protocol or bus standard and thereby couples to a sensor.
- a communication interface circuit such as a universal serial bus (USB), BLE, or the like, may be used.
- the sensor device 100 A includes the sensor interface circuit 109 of FIG. 15 , and thereby, an existing sensor including a specific communication interface may be used. Therefore, a sensor device that corresponds to the sensor device 100 of the first embodiment may be achieved by coupling the existing sensor to the sensor interface circuit 109 of the sensor device 100 A.
- FIG. 16 is a diagram illustrating an example of a sequence when the cloud server 30 issues a token (a token ID and an encryption key) which corresponds to a user.
- the token management terminal 200 generates a token that corresponds to a user ID given to the NFC tag 110 of a patient, but a configuration in which the cloud server 30 generates a token, as illustrated in FIG. 16 , may be employed.
- processes of S 1 to S 3 are similar to the processes of S 1 to S 3 in FIG. 8 , and therefore, the description thereof will be omitted.
- the token management terminal 200 when the token management terminal 200 acquires information of the user ID of a patient by performing the processes of S 1 to S 3 , the token management terminal 200 notifies the cloud server 30 of the acquired information of the user ID and information related to the sensor device 100 that is used for measuring data for the patient.
- the token management terminal 200 performs a communication with the cloud server 30 by performing an encrypted communication, such as SSL or the like, and notifies information of the user ID to the cloud server 30 (S 4 ).
- the cloud server 30 generates a token including a specific encryption key and a token ID, based on the user ID and information related to the sensor device 100 , which have been received, and transmits the generated token to the token management terminal 200 (S 5 ).
- the token management terminal 200 transmits the token received from the cloud server 30 to the sensor device 100 (S 6 ).
- the sensor device 100 receives the token from the token management terminal 200
- the sensor device 100 starts a measurement for the patient, encrypts a measurement result using an encryption key included in the token, and transmits the encrypted measurement result with the token ID to the cloud server 30 (S 7 ).
- tokens of users may be centrally managed at the cloud server 30 side.
- each time a measurement is performed the sensor device 100 requests the token management terminal 200 to generate a new token and the token management terminal 200 that has received a token generation request generates a new token.
- the token management table 280 in FIG. 12 illustrates, when a plurality of tokens that correspond to a plurality of users is held in the token management table 280 in advance, a token of a user may be generated or updated at an arbitrary timing.
- a configuration in which, once a day, at a certain determined time, for all tokens stored in the token management table 280 , the token management terminal 200 changes a token ID and the contents of an encryption key and transmits the token ID and the contents of the encryption key which have been changed to the cloud server 30 in advance may be employed.
- processing of generating a token, transmitting the token to the cloud server 30 , and waiting for a response, which is performed by the token management terminal 200 before using the sensor device 100 may be omitted.
- the gateway 120 when the gateway 120 is installed in each of all rooms in a hospital, the functions of the token management terminal 200 may be mounted as they are in the gateway 120 .
- the WiFi interface circuit 205 may be replaced with a network interface circuit 209 (not illustrated).
- the network interface circuit 209 is an interface circuit that performs a communication with another device via the network 40 .
- the gateway 120 in which the functions of the token management terminal 200 are mounted is used, and thus, even when a person (a nurse or the like) who uses the sensor device 100 does not carry the token management terminal 200 , a token that corresponds to a user ID may be registered in the sensor device 100 . Also, the gateway 120 in which the functions of the token management terminal 200 are mounted is used, and thus, a patient in each hospital room may voluntarily hold the NFC tag 110 over an NFC tag reader part (which corresponds to the NFC interface circuit 206 in FIG. 3 ) of the gateway 120 and perform a measurement using the sensor device 100 .
- a program that causes the computer 300 to execute each of the processes in the sensor device 100 , the token management terminal 200 , and the cloud server 30 , which have been described above, may be stored in a computer-readable recording medium.
- a recording medium for example, a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like may be used.
- a magnetic disk include a HDD and the like.
- an optical disk include a compact disc (CD), a CD-recordable (R)/rewritable (RW), a digital versatile disc (DVD), a DVD-R/RW, and the like.
- distribution of a program according to the present disclosure is not limited to distribution using the above-described recording medium, and a program may be transmitted via a network or the like, represented by a telecommunication line, a wireless or wired communication line, and the Internet, is stored in a recording medium, such as a HDD or the like, and thus, is used.
- a network or the like represented by a telecommunication line, a wireless or wired communication line, and the Internet
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Biomedical Technology (AREA)
- Epidemiology (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
- Computing Systems (AREA)
Abstract
An information processing system includes an information processing device including a processor, an electronic tag configured to store first identification information used for identifying a monitor target, and a sensor device configured to acquire first monitor information of the monitor target, wherein the processor is configured to transmit, to the sensor device and a server device, a first encryption key corresponding to the first identification information, and transmit, to the sensor device and a server device, second identification information used for identifying the first encryption key, and the sensor device is configured to acquire the first identification information from the electronic tag, encrypt the first monitor information using the first encryption key that corresponds to the first identification information, and transmit, to the server device, the encrypted first monitor information and the second identification information.
Description
- This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2016-082533, filed on Apr. 15, 2016, the entire contents of which are incorporated herein by reference.
- The embodiments discussed herein are related to an information processing system, a method of obtaining monitor information, and a sensor device.
- Conventionally, a system in which, for health maintenance and management, information related to a state of a user is acquired from a sensor and is stored in a database coupled to a communication line, the information stored in the database is read out by a terminal device of the user, and thus, health management or the like is performed has been known. For example, a mobile terminal device that acquires biological information, such as body temperature, blood pressure, or the like, of a user using a sensor that is capable of communicating with a mobile terminal, encrypts the acquired biological information using a public key that corresponds to a secret key provided to the mobile terminal, and transmits the information to the database has been known. Data encrypted and thus stored in the database is read out by a mobile terminal of the user or a terminal of the user, is decrypted using the secret key that the user has, and thus is used. As a related art document, there is Japanese Laid-open Patent Publication No. 2005-245833.
- According to an aspect of the invention, an information processing system includes an information processing device including a memory and a processor coupled to the memory, an electronic tag configured to store first identification information used for identifying a monitor target, and a sensor device configured to acquire first monitor information of the monitor target, wherein the processor is configured to transmit, to the sensor device and a server device, a first encryption key corresponding to the first identification information, and transmit, to the sensor device and a server device, second identification information used for identifying the first encryption key, and the sensor device is configured to acquire the first identification information from the electronic tag, encrypt the first monitor information using the first encryption key that corresponds to the first identification information, and transmit, to the server device, the encrypted first monitor information and the second identification information.
- The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
- It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
-
FIG. 1 is a diagram illustrating an example of a system configuration; -
FIG. 2 is a diagram illustrating an example of a hardware configuration of a sensor device; -
FIG. 3 is a diagram illustrating an example of a hardware configuration of a token management terminal; -
FIG. 4 is a diagram illustrating an example of a hardware configuration of a computer included in a cloud server; -
FIG. 5 is an exemplary functional block diagram illustrating processing that is executed by a sensor device, a token management terminal, and a cloud server according to a first embodiment; -
FIG. 6 is a diagram illustrating an example of control information stored in a sensor device, a token management terminal, and a cloud server according to the first embodiment; -
FIG. 7 is a diagram illustrating an example of processing of transmitting monitor information acquired by a sensor device to a cloud server; -
FIG. 8 is a diagram illustrating an example of a sequence in which monitor information is acquired using a sensor device and is transmitted to a cloud server; -
FIG. 9 is a flowchart illustrating an example of processing that is performed by a sensor device; -
FIG. 10 is a flowchart illustrating an example of processing that is performed by a token management terminal; -
FIG. 11 is a flowchart illustrating an example of processing that is performed by a cloud server; -
FIG. 12 is a diagram illustrating an example of a token storage unit and a token management table in a second embodiment; -
FIG. 13 is a flowchart illustrating an example of processing that is performed by a sensor device in the second embodiment; -
FIG. 14 is a flowchart illustrating an example of processing that is performed by a token management terminal according to the second embodiment; -
FIG. 15 is a diagram illustrating another example of a hardware configuration of a sensor device; and -
FIG. 16 is a diagram illustrating an example of a sequence when a cloud server issues a token (a token ID and an encryption key) which corresponds to a user. - In recent years, in a facility, such as a hospital, a medical center, or the like, a system that electrically manages medical charts of patients, measurement data related to the states of the patients has come into wide use. Now, it is considered to store biological information, such as body temperature, blood pressure, or the like, of a patient which is acquired from the patient on a daily basis, in a server that provides a cloud service and to use the biological information.
- In the above-described known technology, when measurement data of a patient is transmitted to a server, a mobile terminal that has received the measurement data from a sensor device performs a communication with a database using an encryption key specific to the mobile terminal, and thus, confidentiality of measured private information from a data transmission user is maintained. However, in a facility, such as a hospital or the like, there may be a case where a device, such as a mobile phone, which generates a strong electric wave, adversely affects medical devices. Also, it is not realistic to prepare an individual mobile phone for each patient. Therefore, it is conceivable to install, in a facility, such as a hospital or the like, a gateway that performs a short-range wireless communication with a weak electric wave in each room and thus perform a wireless communication between a sensor device and the gateway.
- For a wireless communication used for performing a communication between devices in a short range, for example, a communication method, such as Bluetooth (registered trademark), wireless fidelity (WiFi), or the like, in which an encrypted communication is established by performing paring processing of exchanging an encryption key, is used. Therefore, it is conceivable to mount a communication interface that is capable of performing an encrypted communication in the sensor device and thus perform an encrypted communication between the gateway coupled to a network and the sensor device.
- However, paring processing is performed by inputting the same number to both of devices that perform a communication with one another, tapping, if in a communication with a smart phone, or the like. If paring is performed only once between the sensor device and the gateway, no big problem arises but, if various sensors are used in a plurality of hospital rooms and for a plurality of patients, a problem arises in which it takes labor and time for setup for performing a communication. Therefore, it is desirable to safely transmit measurement data to a server using a wireless communication line that does not perform paring processing used for encrypting a communication.
- In embodiments described below, using as an example a case where various types of biological information, such as body temperature, blood pressure, or the like, are acquired from a patient in a hospital, a system that transmits information acquired from a monitor target to a cloud server while ensuring confidentiality of data will be described as an example. However, the contents of the present disclosure are not limited to embodiments applied to use in a hospital, which will be described below, but the present disclosure may be applied to various different monitor targets and various types of monitor information. Embodiments will be described below with reference to the accompanying drawings.
- [System Configuration]
-
FIG. 1 is a diagram illustrating an example of a system configuration according to a first embodiment. In the example of a system configuration illustrated inFIG. 1 , ahospital 10, amedical center 11, and anursing home 12 are coupled to acloud server 30 via anetwork 40. Thehospital 10, themedical center 11, and thenursing home 12 are examples of a facility which acquires various types of biological information from a monitor target, such as a patient or the like, and this embodiment may be applied to some other facility. Thecloud server 30 is a server that provides a so-called cloud service, and is a server device that is coupled to a network environment and performs processing on received data or request. - The
hospital 10 has a plurality ofhospital rooms 20 and, in each hospital room, a plurality of patients has a medical treatment or a medical examination. In each of thehospital rooms 20, biological information, such as body temperature, blood pressure, pulse, or electro cardiogram, of each of the plurality of patients is regularly measured by a nurse using asensor device 100. The patient is an example of monitor targets and biological information measured from each patient is an example of monitor information. - The
sensor device 100 encrypts the measurement data, such as body temperature or the like, of each patient, which has been measured in order to conceal the measurement data and thus transmit the concealed data to acloud server 30. Atoken management terminal 200 is, for example, a terminal device that is carried by a nurse or the like who performs a measurement for each patient and generates a token including an encryption key used for encrypting measurement data and a token ID that is key identification information used for identifying the encryption key. - A gateway (GW) 120 used for performing a communication with the
cloud server 30 via thenetwork 40 is installed in each of thehospital rooms 20. Thesensor device 100 and thegateway 120 are coupled with one another via a wireless communication line, such as Bluetooth Low Energy (BLE) or the like, and thesensor device 100 and thetoken management terminal 200 are coupled with one another via a wireless communication line, such as Bluetooth Low Energy (BLE) or the like. Also, thetoken management terminal 200 is coupled to a wireless access point (AP) 140 and a gateway (GW) 130 via a communication line, such as wireless fidelity (WiFi) or the like. - While each patient is admitted to the
hospital 10 or has an examination in thehospital 10, the patient wears a tag, such as a near field communication (NFC) tag or the like, which used for a short-range wireless communication around a wrist or put the tag on a clothing that the patient wears in the hospital. AnNFC tag 110 is a device that stores tag data, such as a user ID or the like, which is identification information set for each patient. When a regular measurement of the body temperature, blood pressure, or the like of the patient is performed, the user ID stored in theNFC tag 110 is read out by an NFC tag reader or the like mounted in thesensor device 100. - The
token management terminal 200 generates a token used for encrypting measurement data for each of the user IDs of the patients in accordance with a token generation request from thesensor device 100, an operation of a nurse, or the like. Thetoken management terminal 200 notifies thecloud server 30 of the generated token via thewireless AP 140 and thegateway 130. Also, thetoken management terminal 200 notifies thesensor device 100 of the generated token. - The
sensor device 100 performs measurement for a patient using a sensor, such as a thermometer or the like. Thesensor device 100 encrypts biological data measured from the patient using a token received from thetoken management terminal 200 and transmits the encrypted biological data to thecloud server 30 via thegateway 120. - The
cloud server 30 decrypts the encrypted data transmitted from thesensor device 100 using the token notified from thetoken management terminal 200 in advance. Thecloud server 30 processes the measurement data of the patient, which has been decrypted, such that the measurement data may be visualized, and stores the processed data in adatabase 310. The measurement data stored in thedatabase 310 is used for health management performed by the patient or for diagnosis by a doctor. - [Hardware Configuration]
-
FIG. 2 is a diagram illustrating an example of a hardware configuration of thesensor device 100. Thesensor device 100 includes a micro-processing unit (MPU) 101,memory 102, afirst sensor 103, asecond sensor 104, aBLE interface circuit 105, anNFC interface circuit 106, and anonvolatile memory 107. TheMPU 101 is coupled to another circuit, such as thememory 102 or the like, in thesensor device 100 via abus 108. - The
MPU 101 is an example of a processor that executes various types of processing which are performed by thesensor device 100, and is a hardware circuit. Instead of theMPU 101, a hardware circuit, such as a central processing unit (CPU), a field programmable gate array (FPGA), a sequencer circuit, or the like, may be also used. - The
memory 102 is a storage device, such as random access memory (RAM) or the like. Thememory 102 temporarily stores a program that is executed by theMPU 101 or measurement data measured by thesensor device 100. TheMPU 101 executes the program stored in thememory 102, and thereby, each of the various types of processing which are performed by thesensor device 100, which will be described later, is executed. - Each of the
first sensor 103 and thesecond sensor 104 is, for example, a sensor that is used for measuring biological information, such as body temperature, blood pressure, or the like of each patient. Examples of thesensors FIG. 2 , an example in which two sensors, that is, the first sensor and the second sensor, are mounted in thesensor device 100 is illustrated as an example but, only a single sensor may be mounted therein, and also, three or more sensors may be mounted therein. - The
BLE interface circuit 105 is an interface circuit through which thesensor device 100 performs a communication with thegateway 120 or thetoken management terminal 200 via a BLE wireless communication line. TheNFC interface circuit 106 is an interface circuit through which thesensor device 100 acquires tag data from theNFC tag 110 using an NFC short-range wireless communication. TheNFC interface circuit 106 is an example of the NFC tag reader. - The
nonvolatile memory 107 is a storage circuit that is used for storing a program that is executed by theMPU 101. Thenonvolatile memory 107 may be also used for storing the user ID that is identification information of each patient and a token used for encrypting data measured from each patient. -
FIG. 3 is a diagram illustrating an example of a hardware configuration of thetoken management terminal 200. Thetoken management terminal 200 includes aCPU 201,memory 202, a solid state disk (SSD) 203, aBLE interface circuit 204, aWiFi interface circuit 205, anNFC interface circuit 206, and an input and outputdevice interface circuit 207. TheCPU 201 is coupled to another component, such as thememory 202 or the like, via abus 208. - The
CPU 201 is an example of a hardware circuit of a processor that executes various types of processing which are performed by thetoken management terminal 200. Instead of theCPU 201, a hardware circuit, such as a field programmable gate array (FPGA), a sequencer circuit, or the like, may be also used. - The
memory 202 is a storage device, such as RAM or the like. Thememory 202 stores a program that is executed by theCPU 201, or a token including an encryption key that is used by thesensor device 100 when thesensor device 100 encrypts measurement data and a token ID that is key identification information used for identifying the encryption key. Also, thememory 202 stores a user ID that is identification information of a patient and information related to a sensor device used for measuring biological information of the patient in association with each token. TheCPU 201 executes a program stored in thememory 202, and thereby, each of the various types of processing which are performed by thetoken management terminal 200, which will be described later, is executed. - The
SSD 203 is a nonvolatile storage circuit used for storing data, such as a program that is executed by thetoken management terminal 200, or the like. TheSSD 203 may be also used for storing identification information of each patient, a token (an encryption key and a token ID) which corresponds to each patient, and information related to a sensor device that is used for measuring biological information of each patient. - The
BLE interface circuit 204 is an interface circuit through which thetoken management terminal 200 performs a communication with thesensor device 100 or thegateway 120 in each hospital room via the BLE wireless communication line. TheWiFi interface circuit 205 is an interface circuit through which thetoken management terminal 200 performs a communication with thewireless AP 140 via a WiFi wireless communication line. TheNFC interface circuit 206 is an interface circuit through which thetoken management terminal 200 acquires tag data from theNFC tag 110 of a patient using an NFC short-range wireless communication. TheNFC interface circuit 206 is an example of the NFC tag reader. - The input and output
device interface circuit 207 is an interface circuit couples various input and output devices, such as a touch pad input, a display output, or the like, which are used for processing that is performed in thetoken management terminal 200. -
FIG. 4 is a diagram illustrating an example of a hardware configuration of acomputer 300 included in thecloud server 30. Thecomputer 300 includes aCPU 301,memory 302, a hard disk drive (HDD) 303, anetwork interface circuit 304, a database (DB)interface circuit 305, and an input and outputdevice interface circuit 306. - The
CPU 301 is an example of a hardware circuit of a processor that performs various types of processing of thecloud server 30 on thecomputer 300, and one of electronic parts that constitute thecomputer 300. Although, in the example ofFIG. 4 , an example in which thecomputer 300 includes asingle CPU 301 is illustrated, the number of CPUs is not limited to one but thecomputer 300 may include a plurality of CPUs. As another alternative, theCPU 301 may include a plurality of CPU cores and a hardware thread, and a CPU that is capable of performing processing of processes of a plurality of applications in parallel by the single CPU itself may be used as theCPU 301. - The
memory 302 is a storage device, such as RAM or the like. Thememory 302 stores a program that is executed by theCPU 301 or data that is to be a target that is processed by thecomputer 300. TheCPU 301 executes a program stored in thememory 302, and thereby, each of the various types of processing which are performed by thecomputer 300, which will be described later, is executed. - The hard disk drive (HDD) 303 is a nonvolatile storage medium that stores a program that is executed by the
CPU 301 or data that is handled by processing that is executed on theCPU 301. Thenetwork interface circuit 304 is an interface circuit through which thecomputer 300 performs a communication with another device via thenetwork 40. - The database (DB)
interface circuit 305 is an interface circuit that is used for performing a communication with thedatabase 310. In this case, the database (DB) 310 is a database device that stores data related to processing that is performed in thecloud server 30, and stores an operating system (OS) that is executed on thecloud server 30, data used by an application, or the like. Also, theDB 310 stores various types of data, such as measurement data of each patient, which have been received via a network. A DB sever 310 is realized by a storage device, a server including a large capacity storage device, or the like. - The input and output
device interface circuit 306 is a circuit that is used for controlling, when a peripheral device, such as a mouse, a keyboard, or the like, is coupled to thecomputer 300, input and output to and from the peripheral device. - [Functional Block Diagram]
-
FIG. 5 is an exemplary functional block diagram illustrating processing that is executed by thesensor device 100, thetoken management terminal 200, and thecloud server 30 according to the first embodiment. - The
sensor device 100 executes a sensor application program including each processing of anNFC communication unit 151, aBLE communication unit 152, amanagement unit 153, adata processing unit 154, and aconnection determination unit 155. TheMPU 101 executes a predetermined program stored in thememory 102 or thenonvolatile memory 107, and thereby, the sensor application program is executed. - The
NFC communication unit 151 controls theNFC interface circuit 106 and reads out a user ID that identifies a patient (a user) from theNFC tag 110 worn by the patient via the NFC short-range wireless communication line. TheBLE communication unit 152 controls theBLE interface circuit 105 and communicates with thetoken management terminal 200 or thegateway 120 via the BLE wireless communication line. - The
management unit 153 controls overall processing in thesensor device 100. Themanagement unit 153 performs a communication with theNFC tag 110 or thetoken management terminal 200 using theNFC communication unit 151 and theBLE communication unit 152 and manages a token generated by thetoken management terminal 200. - The
data processing unit 154 encrypts measurement data measured from a patient (a user) by thesensor 103 using an encryption key generated for the user ID and generates transmission data including the encrypted data and the token ID that is used for identifying the encryption key. The transmission data, that is, the encrypted measurement data and the token ID, which has been generated by thedata processing unit 154, is transmitted to thegateway 120 by theBLE communication unit 152, and then, is transmitted to thecloud server 30 via thegateway 120. - Note that, as an encryption key, an encryption key in accordance with a so-called public key cryptosystem may be used. The common key cryptosystem is an encryption method in which a “key” that is used by a device that performs encryption and a “key” that is used by a device that performs decryption are the same key. An encryption key may be generated by an arbitrary method and, for example, may be generated by generating a random number of a predetermined bit number.
- The token ID is identification information that is used for identifying the generated encryption key, and may be generated by an arbitrary method. For example, each time an encryption key is generated, a token ID may be generated by generating a random number.
- The token including the encryption key and the token ID is used in common in processing of encrypting data and processing of decrypting the encrypted data. Thus, each time data is measured from a patient using the
sensor device 100, a new token may be generated and used for encryption and decryption of the measured data. A new token is used each time data is measured, and thereby, it is enabled to encrypt measurement data and thus transmit the measurement data more safely. - The
connection determination unit 155 determines whether or not it is possible to execute a communication with thetoken management terminal 200 using theBLE communication unit 152 at the time when thesensor device 100 is used or on a regular basis. Theconnection determination unit 155 stores a result of determination on whether or not it is possible to execute a communication with thetoken management terminal 200, as information indicating “STATE” in a management terminal connection state table 170 which will be described later. - The
token management terminal 200 includes anNFC communication unit 251, aBLE communication unit 252, aWiFi communication unit 253, and amanagement unit 254 and executes an application program that performs token management. TheCPU 201 executes a program stored in thememory 202 or theSSD 203, and thereby, the application program that performs token management is executed. - The
NFC communication unit 251 controls theNFC interface circuit 206 and reads out a user ID that identifies a patient from theNFC tag 110 worn by the patient via the NFC short-range wireless communication line. TheBLE communication unit 252 controls theBLE interface circuit 204 and communicates with thesensor device 100 or thegateway 120 via the BLE wireless communication line. TheWiFi communication unit 253 controls theWiFi interface circuit 205 and communicates with thewireless AP 140 via the WiFi wireless communication line. - The
management unit 254 controls overall processing in thetoken management terminal 200. When the user ID that identifies the patient is acquired from the NFC tag of the patient by theNFC communication unit 251, themanagement unit 254 generates a token including an encryption key that corresponds to the acquired user ID and a token ID that is identification information that uniquely specifies the encryption key. Themanagement unit 254 coupes to thewireless AP 140 using theWiFi communication unit 253 and transmits the generated token to thecloud server 30 via thewireless AP 140 and thegateway 130. Also, themanagement unit 254 transmits the generated token to thesensor device 100 using theBLE communication unit 252. - The
cloud server 30 includes acommunication unit 351, amanagement unit 352, and adata processing unit 353 and executes an application program of a cloud service. TheCPU 301 executes a program stored in thememory 302 or theHDD 303, and thereby, the application program of the cloud service is executed. - The
communication unit 351 performs a communication with another device via thenetwork 40 in accordance with a TCP/IP protocol. When a device of a communication partner supports Secure Sockets Layer (SSL), thecommunication unit 351 performs an encrypted communication using SSL with the device of the communication partner. Themanagement unit 352 performs management of a token that is received from thetoken management terminal 200. - The
data processing unit 353 decrypts the encrypted measurement data that is received from thesensor device 100 using a corresponding encryption key included in a token that has been received in advance. Thedata processing unit 353 performs predetermined processing for visualization of data on the decrypted measurement data and stores the measurement data on which the processing has been performed in thedatabase 310. -
FIG. 6 is a diagram illustrating an example of control information that is stored in thesensor device 100, thetoken management terminal 200, and thecloud server 30 according to the first embodiment. Thesensor device 100 includes atoken storage unit 160 and the management terminal connection state table 170. Thetoken storage unit 160 is a storage unit that stores information (a token ID (tokenID) and an encryption key (key)) of a token that corresponds to a monitor target for which thesensor device 100 performs measurement. In the example ofFIG. 6 , in thetoken storage unit 160, “3ef698b” is stored as a token ID and “Key-A” is stored as an encryption key. - The management terminal connection state table 170 is a storage unit that stores information related to “STATE” indicating whether or not the
sensor device 100 is coupled to thetoken management terminal 200 via the BLE wireless communication line or the like. In items of “HOST NAME” and “MANAGEMENT TERMINAL DEVICE ADDRESS” in the management terminal connection state table 170, information, such as, for example, the host name (“tokenMngr1”) of thetoken management terminal 200 that was coupled to thesensor device 100 last and the address (“23:AB:84:B8:65:C8”) of BLE, is stored. - In the item of “STATE” in the management terminal connection state table 170, for example, a result of determination on whether or not it is possible to couple the
connection determination unit 155 to thetoken management terminal 200 via the BLE wireless communication line on a regular basis is stored. In the example ofFIG. 6 , thetoken management terminal 200 the host name of which is “tokenMngr1” is in a state of “UNCOUPLED”. - The
token management terminal 200 includes a token management table 260. The token management table 260 is a storage unit that stores information, such as a token (a token ID (tokenID) and an encryption key (key)) that corresponds to a monitor target on which thesensor device 100 performs a measurement, identification information (a user ID) of a monitor target, a device ID that is used for identifying thesensor device 100, or the like. - In the example of
FIG. 6 , the encryption key “Key-A” and the token ID “3ef698b” are stored in association with the user ID “User-A” in the token management table 260. Also, information (a device type, a device name, and a device ID) related to thesensor device 100 that performs a measurement for a patient the user ID of which is “User-A” is also stored in association with the user ID “User-A” in the token management table 260. The token management table 260 illustrated inFIG. 6 illustrates an example in which information related to a single user ID is stored, but a plurality of sets of information each of which corresponds to the corresponding one of the user IDs of a plurality of patients, which are simultaneously measured, may be stored therein. - The
cloud server 30 includes a cloud service table 360. The cloud service table 360 is a storage unit that stores a token including an encryption key that is used for decrypting encrypted data which is received from thesensor device 100 and a token ID that is used for identifying the encryption key in association with information, such as a user ID, the device type of thesensor device 100, or the like. The number of pieces of information related to a token that is stored in the cloud service table 360 is not limited to one. When thecloud server 30 receives pieces of encrypted data from a plurality ofdifferent sensor devices 100, a plurality of tokens each of which corresponds to the corresponding one of the plurality ofsensor devices 100 is stored in the cloud service table 360. - [Processing Flow]
-
FIG. 7 is a diagram illustrating an example of processing of transmitting monitor information acquired by a sensor device to a cloud server. Processing illustrated inFIG. 7 is largely divided into three processes. The processing will be specifically described below in accordance with a flow of data. - (1) Generate Token and Link Sensor and User
- First, the
sensor device 100 performs a short-range wireless communication with theNFC tag 110 of a patient that is a measurement target of the sensor by NFC (S1), and reads out a user ID (“user-A”) that is the identification information of the patient from the NFC tag 110 (S2). Thesensor device 100 transmits a token generation request to thetoken management terminal 200 via a wireless communication line, such as BLE or the like (S3). In that case, thesensor device 100 transmits information of a user ID (“user-A”), the device identification information (a device ID) of the sensor that measures data from the patient, or the like, to thetoken management terminal 200. - When the
token management terminal 200 receives the token generation request from thesensor device 100, thetoken management terminal 200 generates an encryption key (“key-A”) that corresponds to the identification information of the patient, which has been received, and a token ID (“3ef698b”) as key identification information that is used for identifying the encryption key. Thetoken management terminal 200 registers the encryption key and token ID that have been generated with the identification information (“user-A”) of the patient, which has been received from the sensor, and information related to the identification information of the sensor, or the like in the token management table 260. - The
token management terminal 200 transmits a token including the token ID (“3ef698b”) and the encryption key (“key-A”) that have been generated to thecloud server 30 via thewireless AP 140, theGW 130, or the like (S4). Thetoken management terminal 200 may be configured to transmit, in that case, the user ID (“user-A”) and information related to the type (for example, “THERMOMETER”) of the sensor device that performs a measurement with the token to thecloud server 30. Note that the user ID and the information related to the type of the sensor device may be encrypted with the measurement data and thus be included in the encrypted data that is generated by thesensor device 100. - The
cloud server 30 responds to thetoken management terminal 200, indicating that information, such as the token ID, the encryption key, or the like, which has been received from thetoken management terminal 200, has been registered in the cloud service table 360 and has been correctly received. When thetoken management terminal 200 receives, from thecloud server 30, a response indicating that the information has been correctly received, thetoken management terminal 200 transmits the token ID (“3ef698b”) and the encryption key (“key-A”) that have been generated to the sensor device 100 (S5). When thesensor device 100 receives, from thetoken management terminal 200, the information of the token (the token ID, the encryption key) of the patient that is a measurement target, thesensor device 100 stores the information of the token which has been received in thetoken storage unit 160. - By processes of S1 to S5 of
FIG. 7 , generation of a token that corresponds to the patient that is to be a measurement target and linkage of the sensor device and the user (the patient) to one another are performed. That is, both of thesensor device 100 and thecloud server 30 share information of the token (the token ID, the encryption key) of the patient that is a measurement target. - (2) Encryption of Measurement Data
- The
sensor device 100 measures information, such as body temperature or the like, from the patient using thesensor 103. Thesensor device 100 encrypts the measurement data measured from the patient using the encryption key received from thetoken management terminal 200 and generates encrypted data. Thesensor device 100 transmits transmission data including the generated encrypted data and the corresponding token ID (“3ef698b”) to thecloud server 30 via the gateway 120 (S6). - (3) Decryption of Encrypted Data
- When the
cloud server 30 receives the encrypted data and the token ID (“3ef698b”), thecloud server 30 acquires the encryption key (“key-A”) that corresponds to the received token ID from the cloud service table 360. Thecloud server 30 decrypts the encrypted data received from thesensor device 100 using the acquired encryption key (“key-A”). Thecloud server 30 stores the decrypted measurement data in thedatabase 310. Thecloud server 30 may be configured to perform, in that case, processing for visualization, as appropriate, and store the processed data in thedatabase 310. - By the above-described processing described in (1) and (2), it is enabled to encrypt measurement data measured from a patient using a specific encryption key generated in accordance with a user ID and thus transmit the encrypted measurement data to the
cloud server 30. Then, in the processing of (3), in thecloud server 30, the encrypted measurement data may be decrypted using the specific encryption key that corresponds to the token ID which has been acquired from thetoken management terminal 200 in advance. By the above-described processing of (1) to (3), the measurement data that has been measured from the patient may be safely transmitted to thecloud server 30. - Note that, in the first embodiment, a configuration in which, each time the
sensor device 100 measures data from a patient, a token generation request is given to thetoken management terminal 200, a new token is acquired, and information stored in thetoken storage unit 160 is updated may be employed. In this case, a specific token that is used only once is generated each time data is measured from the patient. Therefore, thetoken storage unit 160 in the first embodiment does not store the user ID and the confidentiality of the measurement data acquired from the patient is increased. - The
token management terminal 200 may be configured to acquire information of the user ID, by processes of S1′ and S3′, instead of the processes of S1 to S3, in processing of token generation and sensor and user linkage illustrated in (1) ofFIG. 7 . That is, a configuration in which, instead of processing of reading out theNFC tag 110 performed by thesensor device 100, thetoken management terminal 200 reads out the user ID directly from theNFC tag 110 of a patient using theNFC interface circuit 206 may be employed. In this case, thetoken management terminal 200 links the device ID of thesensor device 100 that measures data of the patient that is a target, among thesensor devices 100 coupled thereto via the BLE communication line at that time, to the user ID. When a plurality of sensor devices is coupled to thetoken management terminal 200, for example, a selection screen may be output to a touch panel of thetoken management terminal 200 and asensor device 100 that is to be linked may be determined based on a selection result input through the selection screen. - When the
token management terminal 200 acquires the identification information of the user ID from theNFC tag 110, thetoken management terminal 200 generates a corresponding token and transmits the token to thesensor device 100 that is used for measuring data of a patient. The sensor device encrypts measurement data using the token acquired from thetoken management terminal 200 and transmits the encrypted measurement data to thecloud server 30. -
FIG. 8 is a diagram illustrating an example of a sequence in which monitor information is acquired using a sensor device and is transmitted to a cloud server, and illustrates the contents that have been described with reference toFIG. 7 in a sequence diagram. Each of processes of S1 to S6 inFIG. 8 corresponds to the corresponding one of the processes of S1 to S6 illustrated inFIG. 7 . - First, the
sensor device 100 performs a short-range wireless communication using theNFC tag 110 mounted in a medical band worn by a patient and NFC (S1) and acquires information of the user ID (“user-A”) from the NFC tag 110 (S2). Thesensor device 100 transmits a token generation request with the acquired information of the user ID to the token management terminal 200 (S3). Thesensor device 100 may be configured to transmit, in that case, the device ID that identifies the self-device with the token generation request to thetoken management terminal 200. - The
token management terminal 200 generates a token including an encryption key and a token ID that correspond to the user ID. Thetoken management terminal 200 transmits the generated token with the user ID and the information of the sensor to the cloud server 30 (S4). In that case, thetoken management terminal 200 performs a communication with thecloud server 30 by performing an encrypted communication, such as SSL or the like, and notifies thecloud server 30 of the information of the user ID. - When the
token management terminal 200 receives a response from thecloud server 30, thetoken management terminal 200 transmits the generated token to the sensor device 100 (S5). In that case, thetoken management terminal 200 transmits the generated token with information (for example, the device ID) that identifies thesensor device 100 of a destination. - The
sensor device 100 encrypts measurement data measured from the patient using the encryption key included in the token received from thetoken management terminal 200 and transmits the encrypted data with the token ID to the cloud server 30 (S6). When data, such as, for example, an electro cardiogram or the like, is continuously measured from a patient, regularly measured data is encrypted using the same encryption key and the encrypted data is transmitted with the token ID to thecloud server 30. - [Flow Chart]
-
FIG. 9 is a flowchart illustrating an example of processing that is performed by a sensor device. Thesensor device 100 receives a message from theNFC tag 110 or thetoken management terminal 200 via the NFC communication line or the BLE communication line (S101). - When the
sensor device 100 receives a message, thesensor device 100 determines whether or not the received message is a message that has been received from the NFC tag 110 (S102). If the received message is not a message that has been received from the NFC tag 110 (NO in S102), thesensor device 100 determines whether or not the received message is a token that has been transmitted from thetoken management terminal 200 to the self-device (S103). If the received message is not a token that has been transmitted to the self-device (NO in S103), it is assumed that the received message is not a message that is to be processed by thesensor device 100, the process returns to S101, and thesensor device 100 waits until receiving a next message. - If the message received by the
sensor device 100 is the user ID that has been received from the NFC tag 110 (YES in S102), thesensor device 100 transmits a token generation request with the received information of the user ID to the token management terminal 200 (S104). Then, thesensor device 100 waits until a token that corresponds to the transmitted token generation request is returned from the token management terminal 200 (NO in S105). When thesensor device 100 receives the generated token from the token management terminal 200 (YES in S105), the process proceeds to S106. On the other hand, also, if the message received by thesensor device 100 is a token that has been received from the token management terminal 200 (YES in S103), the process proceeds to Step S106. - In S106, the token (the encryption key, the token ID) that has been received from the
token management terminal 200 is stored (registered) in thetoken storage unit 160. Then, thesensor device 100 performs a measurement of the body temperature or the like from the patient using the sensor 103 (S107). Thesensor device 100 encrypts measurement data acquired by the measurement using the encryption key included in the token that has been received from thetoken management terminal 200 and generates encrypted data (S108). Thesensor device 100 transmits the generated encrypted data with the token ID to the cloud server 30 (S109). -
FIG. 10 is a flowchart illustrating an example of processing that is performed by thetoken management terminal 200. Thetoken management terminal 200 receives a message via the NFC communication line and the BLE communication line (S201). - When the
token management terminal 200 receives a message, thetoken management terminal 200 determines whether or not the received message is a message that has been received from the NFC tag 110 (S202). If the received message is not a message that has been received from the NFC tag 110 (NO in S202), thetoken management terminal 200 determines whether or not the received message is a token generation request that has been received from the sensor device 100 (S203). If the received message is not a token generation request either (NO in S203), thetoken management terminal 200 performs processing in accordance with the received message (S204), and the process proceeds to S201. - If a user ID is received from the NFC tag 110 (YES in S202) or if a token generation request is received from the sensor device 100 (YES in S203), the
token management terminal 200 generates a token that corresponds to the received user ID (S205). Thetoken management terminal 200 registers (stores) the generated token (the encryption key, the token ID) in accordance with the received user ID with information, such as the identification information of thesensor device 100 coupled thereto via the BLE line, or the like, in the token management table 260 (S206). - The
token management terminal 200 notifies thecloud server 30 of the token and the information of thesensor device 100 that have been registered in the token management table 260 (S207) and waits until a response from thecloud server 30 is returned (NO in S208). When the token management table 260 receives a response from the cloud server 30 (YES in S208), the token management table 260 transmits the generated token (the encryption key, the token ID) to the sensor device 100 (S209). -
FIG. 11 is a flowchart illustrating an example of processing that is performed by thecloud server 30. Thecloud server 30 receives a message via the network 40 (S301). A message that is received includes, for example, a token registration request that has been generated by thetoken management terminal 200 or encrypted data that has been generated by thesensor device 100. - When the
cloud server 30 receives a message, thecloud server 30 determines whether or not the received message is encrypted data that has been generated by the sensor device 100 (S302). If the received message is not encrypted data (NO in S302), thecloud server 30 determines whether or not the received message is a token registration request that has been generated by the token management terminal 200 (S303). If the received message is not a token registration request either (NO in S303), the process returns to S301. - If the received message is a token registration request (YES in S303), the
cloud server 30 registers information related to a token included in the token registration request in the cloud service table 360 (S304). Then, thecloud server 30 transmits a response indicating that registration of a token is completed to the token management terminal 200 (S305). - On the other hand, if the received message is encrypted data that has been generated by the sensor device 100 (YES in S302), the token ID that has been received with the encrypted data is acquired from the received message (S306). The
cloud server 30 acquires information of an encryption key that corresponds to the acquired token ID from the cloud service table 360 (S307). Then, thecloud server 30 decrypts the received encrypted data using the corresponding encryption key (S308). - The
cloud server 30 processes the decrypted measurement data of the patient for visualization, as appropriate (S309), and registers the processed data in the database 310 (S310). - As described above, in the first embodiment, when biological information, such as body temperature or the like, of a patient is acquired using the
sensor device 100, thetoken management terminal 200 generates a token (an encryption key, a token ID) that corresponds to a user ID that identifies a patient that is a measurement target separately from identification information of the patient. Thetoken management terminal 200 transmits the generated token to both of thecloud server 30 and thesensor device 100. Thesensor device 100 encrypts measurement data measured from the patient using the encryption key included in the token and transmits the corresponding token ID, not a user ID that directly specifies the patient, with the encrypted data to the cloud server. - The
cloud server 30 specifies the corresponding encryption key which has been received in advance from the token ID that has been received with the encrypted data and decrypts the received encrypted data using the specified encryption key. Thus, in the first embodiment, the measurement data is encrypted using the encryption key that has been generated in accordance with the user ID and the encrypted data and the patient are linked to one another using the token ID that has been generated as separate identification information from the user ID that directly specifies the patient of a measurement target. In that case, also when a communication line through which an encryption communication by paring or the like is not performed and which has not been encrypted is used, data that has been encrypted in advance may be transmitted, and therefore, it is enabled to safely transmit the data. Therefore, the measurement data may be safely transmitted to thecloud server 30 from thesensor device 100. - Also, each time biological information, such as body temperature or the like, is measured from a patient using the
sensor device 100, a specific token is issued by thetoken management terminal 200 coupled to thesensor device 100. Thus, a different token ID and a different key are used each time measurement data is encrypted and thus transmitted, and therefore, it is enabled to transmit the measurement data more safely. - In the first embodiment, an embodiment in which it is assumed that, when a measurement for a patient that is a monitor target is performed using the
sensor device 100, a person (a nurse or the like) who performs a measurement carries thetoken management terminal 200 has been described. However, depending on cases, there may be a case where a person (a nurse or the like) who performs a measurement for a patient using thesensor device 100 does not carry thetoken management terminal 200. Also, when a patient is transported to an emergency room of a hospital, or the like, a case where an NFC tag that is allocated to the patient has not been prepared may be assumed. Therefore, in a second embodiment, an example of a configuration used for, even under a different condition from that of the first embodiment, performing a measurement using thesensor device 100, encrypting measurement data, and transmitting the encrypted measurement data to thecloud server 30 will be described. -
FIG. 12 is a diagram illustrating an example of a token storage unit and a token management table according to the second embodiment. In the second embodiment, thesensor device 100 includes atoken storage unit 180 and thetoken management terminal 200 includes a token management table 280. Thetoken storage unit 180 is stored, for example, in thenonvolatile memory 107. The token management table 280 is stored, for example, in theSSD 203. - Information of a plurality of token IDs, encryption keys, and user IDs is registered in the
token storage unit 180 included in thesensor device 100. Thetoken storage unit 180 stores information of a token ID and an encryption key that was received last from thetoken management terminal 200 in association with each user ID. If, when thesensor device 100 receives a token from thetoken management terminal 200, there is a token associated with a user ID that corresponds to the received token in thetoken storage unit 180, thesensor device 100 overwrites an old token with a newly received token. If there is not a token associated with a user ID that corresponds to the received token in thetoken storage unit 180, thesensor device 100 adds the received token as a new token to thetoken storage unit 180. - Similarly, the token management table 280 included in the
token management terminal 200 stores information of a newest token issued to eachsensor device 100. If, when thetoken management terminal 200 generates a new token, there is a token that corresponds to the same user ID in the token management table 280, thetoken management terminal 200 overwrites the token and, if not, adds the token as a new token. - A method for removing information stored in the
token storage unit 180 may be performed by various methods. For example, a configuration in which, when thesensor device 100 includes an input device, such as a reset button or the like, a person who uses thesensor device 100 presses the reset button to initialize or remove the information stored in thetoken storage unit 180 may be employed. Also, a configuration in which information related to a token stored in thetoken storage unit 180 is removed in accordance with a message of a token removal request that has been received from thetoken management terminal 200 may be employed. Similarly, a configuration in which, also for information of a token stored in the token management table 280, information registered in the token management table 280 may be removed based on information input by a person who uses thetoken management terminal 200, or the like may be employed. -
FIG. 13 is a flowchart illustrating an example of processing that is performed by a sensor device according to the second embodiment. Thesensor device 100 receives a message from theNFC tag 110 or thetoken management terminal 200 via the NFC communication line or the BLE communication line (S111). - When the
sensor device 100 receives a message, thesensor device 100 determines whether or not the received message is a message that has been received from the NFC tag 110 (S112). If the received message is not a message that has been received from the NFC tag 110 (NO in S112), thesensor device 100 determines whether or not the received message is a token that has been transmitted to the self-device from thetoken management terminal 200 and received (S113). If the received message is not a token that has been transmitted to the self-device and received (NO in S113), it is assumed that the received message is not a message that is to be processed by thesensor device 100, the process returns to S111, and thesensor device 100 waits until receiving a next message. If the received message is a token that has been transmitted to the self-device and received (YES in S113), the process proceeds to S117. - If a message received by the
sensor device 100 has a user ID that has been received from the NFC tag 110 (YES in S112), theconnection determination unit 155 refers to the management terminal connection state table 170 and determines whether or not thetoken management terminal 200 is coupled thereto (S114). If it is determined that thetoken management terminal 200 is coupled thereto (YES in S114), a token generation request is transmitted with the user ID to the token management terminal 200 (S115). - The
sensor device 100 waits until receiving the generated token from the token management terminal 200 (NO in S116) and, when thesensor device 100 receives the generated token (YES in S116), registers the generated token in the token storage unit 180 (S117). If a token that was generated for the same user ID before is already registered in thetoken storage unit 180, the token stored in thetoken storage unit 180 is overwritten with the token newly received from thetoken management terminal 200. - When the generated token is registered in the
token storage unit 180, thesensor device 100 performs a measurement for a measurement target using the sensor 103 (S118). When measurement data is acquired from the measurement target by a measurement, thesensor device 100 encrypts the measurement data using an encryption key included in the token registered in the token storage unit 180 (S119). Thesensor device 100 transmits encrypted data acquired by encrypting the measurement data with the token ID included in the token registered in thetoken storage unit 180 to the cloud server 30 (S120). TheBLE communication unit 152 transmits the encrypted data to thegateway 120 and thegateway 120 transmits the encrypted data to thecloud server 30 via thenetwork 40, thereby performing transmission of the encrypted data. - On the other hand, if it is determined in the determination of S114 that the
token management terminal 200 is not coupled thereto (NO in S114), whether or not the token that corresponds to the user ID received from theNFC tag 110 is stored in the token storage unit 180 (S121). If it is determined that the token that corresponds to the user ID is stored in the token storage unit 180 (YES in S121), thesensor device 100 executes processes of S118 to S120. - In the determination of S121, if it is determined that the token that corresponds to the user ID is not stored in the token storage unit 180 (NO in S121), the
sensor device 100 performs processing of establishing an encrypted communication path with thegateway 120 by the BLE communication unit 152 (S122). The processing of establishing an encrypted communication path is performed by, for example, processing of paring in which an encryption key is exchanged, or the like. Thereafter, thesensor device 100 performs a measurement using the sensor 103 (S123) and transmits the acquired measurement data to thecloud server 30 via the encrypted communication path that has been established in S122 (S124). -
FIG. 14 is a flowchart illustrating an example of processing that is performed by a token management terminal according to the second embodiment. Thetoken management terminal 200 receives a message via the NFC communication line or the BLE communication line (S211). Also, thetoken management terminal 200 receives a message related to an operation, or the like, input by an operator via an input device, such as a touch panel or the like (S211). - When the
token management terminal 200 receives a message, thetoken management terminal 200 determines whether or not the received message is a message that has been received from the NFC tag 110 (S212). If the received message is a user ID that has been received from the NFC tag 110 (YES in S212), thetoken management terminal 200 generates a new token that corresponds to the received user ID (S214) and registers the generated token in the token management table 280 (S215). If, when the generated token is registered in the token management table 280, a token that was generated for the same user ID before is stored, thetoken management terminal 200 overwrites the token that was generated before with the newly generated token. - When the generated token is registered in the token management table 280, the
token management terminal 200 notifies thecloud server 30 of the generated token (S216) and waits for a response from the cloud server 30 (NO in S217). When thetoken management terminal 200 receives a response that notifies that the transmitted token has been correctly received at the cloud server 30 (YES in S217), thetoken management terminal 200 transmits the generated token to the sensor device 100 (S218) and terminates the process. - On the other hand, if it is determined in the determination of S212 that the received message is not a message that has been received from the NFC tag (NO in S212), the
token management terminal 200 determines whether or not the received message is a token generation request (S213). If the received message is a token generation request that has been received with information of the user ID from the sensor device 100 (YES in S213), processing of generating a token that corresponds to the received user ID and transmitting the generated token (S214 to S218). - If, in the determination of S213, the received message is not a token generation request either (NO in S213), the
token management terminal 200 determines whether or not the received message is a token removal request that has been input by the operator of the token management terminal 200 (S219). If the input message is not a token removal request either (NO in S219), processing in accordance with the received message is executed (S220) and the process returns to S211. - If, in the determination of S219, it is determined that the received message is a token removal request (YES in S219), the
token management terminal 200 performs processing of removing a token requested by the token removal request from the token management table 280 (S221). The token removal request includes, for example, information of the token ID or the user ID which is related to a token that is to be a removal target. The information of the token ID, the user ID, or the like which is related to a token that is to be a removal target, is input, for example, by an arbitrary method, such as input via the touch panel of thetoken management terminal 200, or the like. - As described above, when the
sensor device 100 according to the second embodiment receives a user ID from theNFC tag 110, thesensor device 100 checks a connection condition of thetoken management terminal 200. If thetoken management terminal 200 is coupled thereto, thesensor device 100 requests thetoken management terminal 200 to generate a new token, encrypts measurement data using the newly generated token, and transmits the encrypted data to thecloud server 30. Accordingly, if thetoken management terminal 200 is coupled to thesensor device 100, thesensor device 100 is capable of performing encryption, and thus, transmission of data using a new token at all times and safely transmit measurement data to thecloud server 30. - Also, even in a condition in which the
token management terminal 200 is not coupled to thesensor device 100, if a token that corresponds to the user ID is stored in thetoken storage unit 180, the token stored in thetoken storage unit 180 is used. In this case, it is possible to encrypt measurement data using a token generated at the time of a measurement in the past and thus transmit the encrypted measurement data to thecloud server 30. - In a state where there is not the
token management terminal 200 near a person (a nurse or the like) who uses thesensor device 100, when an emergency patient is transported by an ambulance car or when a first medical examination of a patient is performed, thetoken management terminal 200 is not capable of generating a token that corresponds to the new patient. Therefore, if there is not thetoken management terminal 200 near thesensor device 100, an encrypted communication line with thegateway 120 is established by a method, such as paring or the like, and thereby, thesensor device 100 is enabled to transmit the measurement data to thecloud server 30. In that case, even when there is not information of the user ID, the measurement data is transmitted with the identification information of thesensor device 100 to thecloud server 30 and is stored with a reception time of the measurement data in thedatabase 310 at thecloud server 30 side, and thereby, it is possible to check a measurement result later. - Preferred embodiments have been described in detailed above, but the present disclosure is not limited to specific embodiments and various modifications and changes may be made to those embodiments, as described below.
- (1) Another Example of Hardware Configuration of Sensor Device
-
FIG. 15 is a diagram illustrating another example of a hardware configuration of a sensor device. Asensor device 100A ofFIG. 15 includes asensor interface circuit 109 used for coupling to some other sensor than thefirst sensor 103 and thesecond sensor 104. In this case, a configuration in which thefirst sensor 103 and thesecond sensor 104 are not mounted in thesensor device 100A may be employed. - The
sensor interface circuit 109 is an interface circuit that performs transmission and reception of a signal in accordance with a specific communication protocol or bus standard and thereby couples to a sensor. As an example of thesensor interface circuit 109, for example, a communication interface circuit, such as a universal serial bus (USB), BLE, or the like, may be used. Thesensor device 100A includes thesensor interface circuit 109 ofFIG. 15 , and thereby, an existing sensor including a specific communication interface may be used. Therefore, a sensor device that corresponds to thesensor device 100 of the first embodiment may be achieved by coupling the existing sensor to thesensor interface circuit 109 of thesensor device 100A. - (2) Example in which Token is Generated in
Cloud Server 30 -
FIG. 16 is a diagram illustrating an example of a sequence when thecloud server 30 issues a token (a token ID and an encryption key) which corresponds to a user. In the first embodiment or the second embodiment, thetoken management terminal 200 generates a token that corresponds to a user ID given to theNFC tag 110 of a patient, but a configuration in which thecloud server 30 generates a token, as illustrated inFIG. 16 , may be employed. InFIG. 16 , processes of S1 to S3 are similar to the processes of S1 to S3 inFIG. 8 , and therefore, the description thereof will be omitted. - In
FIG. 16 , when thetoken management terminal 200 acquires information of the user ID of a patient by performing the processes of S1 to S3, thetoken management terminal 200 notifies thecloud server 30 of the acquired information of the user ID and information related to thesensor device 100 that is used for measuring data for the patient. In this case, thetoken management terminal 200 performs a communication with thecloud server 30 by performing an encrypted communication, such as SSL or the like, and notifies information of the user ID to the cloud server 30 (S4). Thecloud server 30 generates a token including a specific encryption key and a token ID, based on the user ID and information related to thesensor device 100, which have been received, and transmits the generated token to the token management terminal 200 (S5). - The
token management terminal 200 transmits the token received from thecloud server 30 to the sensor device 100 (S6). When thesensor device 100 receives the token from thetoken management terminal 200, thesensor device 100 starts a measurement for the patient, encrypts a measurement result using an encryption key included in the token, and transmits the encrypted measurement result with the token ID to the cloud server 30 (S7). Thus, tokens of users may be centrally managed at thecloud server 30 side. - (3) Modified Example of Token Generation Timing
- In the first embodiment and the second embodiment, each time a measurement is performed, the
sensor device 100 requests thetoken management terminal 200 to generate a new token and thetoken management terminal 200 that has received a token generation request generates a new token. However, as the token management table 280 inFIG. 12 illustrates, when a plurality of tokens that correspond to a plurality of users is held in the token management table 280 in advance, a token of a user may be generated or updated at an arbitrary timing. - For example, a configuration in which, once a day, at a certain determined time, for all tokens stored in the token management table 280, the
token management terminal 200 changes a token ID and the contents of an encryption key and transmits the token ID and the contents of the encryption key which have been changed to thecloud server 30 in advance may be employed. Thus, processing of generating a token, transmitting the token to thecloud server 30, and waiting for a response, which is performed by thetoken management terminal 200 before using thesensor device 100, may be omitted. - (4) Example of Configuration in which Functions of
Token Management Terminal 200 are Mounted in Gateway - For example, when the
gateway 120 is installed in each of all rooms in a hospital, the functions of thetoken management terminal 200 may be mounted as they are in thegateway 120. In this case, for eachgateway 120, among the hardwares illustrated inFIG. 3 , theWiFi interface circuit 205 may be replaced with a network interface circuit 209 (not illustrated). Thenetwork interface circuit 209 is an interface circuit that performs a communication with another device via thenetwork 40. - The
gateway 120 in which the functions of thetoken management terminal 200 are mounted is used, and thus, even when a person (a nurse or the like) who uses thesensor device 100 does not carry thetoken management terminal 200, a token that corresponds to a user ID may be registered in thesensor device 100. Also, thegateway 120 in which the functions of thetoken management terminal 200 are mounted is used, and thus, a patient in each hospital room may voluntarily hold theNFC tag 110 over an NFC tag reader part (which corresponds to theNFC interface circuit 206 inFIG. 3 ) of thegateway 120 and perform a measurement using thesensor device 100. - (5) Others
- A program that causes the
computer 300 to execute each of the processes in thesensor device 100, thetoken management terminal 200, and thecloud server 30, which have been described above, may be stored in a computer-readable recording medium. As a recording medium, for example, a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like may be used. Examples of a magnetic disk include a HDD and the like. Examples of an optical disk include a compact disc (CD), a CD-recordable (R)/rewritable (RW), a digital versatile disc (DVD), a DVD-R/RW, and the like. - Note that distribution of a program according to the present disclosure is not limited to distribution using the above-described recording medium, and a program may be transmitted via a network or the like, represented by a telecommunication line, a wireless or wired communication line, and the Internet, is stored in a recording medium, such as a HDD or the like, and thus, is used.
- All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiments of the present invention have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Claims (20)
1. An information processing system comprising:
an information processing device including a memory and a processor coupled to the memory;
an electronic tag configured to store first identification information used for identifying a monitor target; and
a sensor device configured to acquire first monitor information of the monitor target,
wherein
the processor is configured to:
transmit, to the sensor device and a server device, a first encryption key corresponding to the first identification information, and
transmit, to the sensor device and a server device, second identification information used for identifying the first encryption key, and
the sensor device is configured to:
acquire the first identification information from the electronic tag,
encrypt the first monitor information using the first encryption key that corresponds to the first identification information, and
transmit, to the server device, the encrypted first monitor information and the second identification information.
2. The information processing system according to claim 1 , wherein the server device is further configured to decrypt the first monitor information transmitted from the sensor device, based on the first encryption key transmitted from the information processing unit.
3. The information processing system according to claim 1 , wherein
the sensor device is further configured to transmit the first identification information acquired from the electronic tag to the information processing device, and
the information processing device is further configured to generate, based on the first identification information transmitted from the sensor device, the first encryption key and the second identification information.
4. The information processing system according to claim 3 , wherein the sensor device is further configured to:
when the first identification information is transmitted from the electronic tag more than two times, acquire, from the information processing device, a second encryption key and third identification information used for identifying the second encryption key, the a second encryption key corresponding to the first identification information and being different from the first encryption key,
acquire second monitor information of the monitor target, and
encrypt the second monitor information using the second encryption key.
5. The information processing system according to claim 4 , wherein the sensor device is further configured to:
determine whether it is possible to be coupled to the information processing device via a communication line, and
transmit, when it is determined that it is possible to be coupled to the information processing device, the first identification information to the information processing device using the communication line.
6. The information processing system according to claim 5 , wherein the sensor device is further configured to:
encrypt, when it is not determined that it is possible to be coupled to the information processing device, the second monitor information using the first encryption key, and
transmit, to the server device, the encrypted second monitor information and the second identification information.
7. The information processing system according to claim 1 , wherein the information processing device is further configured to transmit, before transmitting the first encryption key and the second identification information to the sensor device, the first encryption key and the second identification information to the server device.
8. A method of obtaining monitor information from a monitor target using an information processing system including an information processing device, an electronic tag storing first identification information used for identifying the monitor target, and a sensor device, the method comprising:
acquiring, by the sensor device, first monitor information of the monitor target;
transmitting, by the information processing device, to the sensor device and a server device, a first encryption key corresponding to the first identification information;
transmitting, by the information processing device, to the sensor device and a server device, second identification information used for identifying the first encryption key;
acquiring, by the sensor device, the first identification information from the electronic tag;
encrypting, by the sensor device, the first monitor information using the first encryption key that corresponds to the first identification information; and
transmitting, by the sensor device, to the server device, the encrypted first monitor information and the second identification information.
9. The method according to claim 8 , further comprising:
decrypting, by the server device, the first monitor information transmitted from the sensor device, based on the first encryption key transmitted from the information processing unit.
10. The method according to claim 8 , further comprising:
transmitting, by the sensor device, the first identification information acquired from the electronic tag to the information processing device; and
generating, by the information processing device, based on the first identification information transmitted from the sensor device, the first encryption key and the second identification information.
11. The method according to claim 10 , further comprising:
when the first identification information is transmitted from the electronic tag more than two times, acquiring, by the sensor device, from the information processing device, a second encryption key and third identification information used for identifying the second encryption key, the a second encryption key corresponding to the first identification information and being different from the first encryption key;
acquiring, by the sensor device, second monitor information of the monitor target; and
encrypting, by the sensor device, the second monitor information using the second encryption key.
12. The method according to claim 11 , further comprising:
determining, by the sensor device, whether it is possible to be coupled to the information processing device via a communication line, wherein,
when it is determined that it is possible to be coupled to the information processing device, the first identification information is transmitted to the information processing device using the communication line.
13. The method according to claim 12 , further comprising:
when it is not determined that it is possible to be coupled to the information processing device, encrypting, by the sensor device, the second monitor information using the first encryption key; and
transmitting, by the sensor device, to the server device, the encrypted second monitor information and the second identification information.
14. The method according to claim 8 , wherein
in the transmitting the first encryption key and in the transmitting second identification information, before transmitting the first encryption key and the second identification information to the sensor device, the first encryption key and the second identification information are transmitted to the server device.
15. A sensor device comprising:
a memory; and
a processor coupled to the memory and configured to;
acquire first monitor information of a monitor target,
obtain, from an information processing device, a first encryption key corresponding to the first identification information,
obtain, from the information processing device, second identification information used for identifying the first encryption key,
acquire first identification information used for identifying the monitor target from an electronic tag,
encrypt the first monitor information using the first encryption key that corresponds to the first identification information, and
transmit, to a server device, the encrypted first monitor information and the second identification information.
16. The sensor device according to claim 15 , wherein the server device is further configured to decrypt the first monitor information transmitted from the sensor device, based on the first encryption key transmitted from the information processing unit.
17. The sensor device according to claim 15 , wherein
the processor is further configured to transmit the first identification information acquired from the electronic tag to the information processing device, and
the information processing device is further configured to generate, based on the first identification information transmitted from the sensor device, the first encryption key and the second identification information.
18. The sensor device according to claim 17 , wherein the processor is further configured to:
when the first identification information is transmitted from the electronic tag more than two times, acquire, from the information processing device, a second encryption key and third identification information used for identifying the second encryption key, the a second encryption key corresponding to the first identification information and being different from the first encryption key,
acquire second monitor information of the monitor target, and
encrypt the second monitor information using the second encryption key.
19. The sensor device according to claim 18 , wherein the processor is further configured to:
determine whether it is possible to be coupled to the information processing device via a communication line, and
transmit, when it is determined that it is possible to be coupled to the information processing device, the first identification information to the information processing device using the communication line.
20. The sensor device according to claim 19 , wherein the processor is further configured to:
encrypt, when it is not determined that it is possible to be coupled to the information processing device, the second monitor information using the first encryption key, and
transmit, to the server device, the encrypted second monitor information and the second identification information.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2016-082533 | 2016-04-15 | ||
JP2016082533A JP2017192117A (en) | 2016-04-15 | 2016-04-15 | Sensor device, information collection system, and information collection method |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170303119A1 true US20170303119A1 (en) | 2017-10-19 |
Family
ID=60038639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/431,943 Abandoned US20170303119A1 (en) | 2016-04-15 | 2017-02-14 | Information processing system, method of obtaining monitor information, and sensor device |
Country Status (2)
Country | Link |
---|---|
US (1) | US20170303119A1 (en) |
JP (1) | JP2017192117A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160092696A1 (en) * | 2014-09-26 | 2016-03-31 | Abhishek Guglani | Remote Server Encrypted Data Provisioning System and Methods |
US20180337803A1 (en) * | 2017-05-17 | 2018-11-22 | Hand Held Products, Inc. | Methods and apparatuses for enabling secure communication between mobile devices and a network |
US20190356479A1 (en) * | 2018-05-17 | 2019-11-21 | Siemens Healthcare Gmbh | Method, server and communication system for secure delivery of patient's image and consent data |
US10540517B2 (en) * | 2016-07-26 | 2020-01-21 | Fujitsu Limited | Information processing apparatus, information processing system and information processing method |
US20210045169A1 (en) * | 2018-03-02 | 2021-02-11 | Nitto Denko Corporation | Device Pairing System And Method, And Device Communication Control System And Method |
CN112368975A (en) * | 2018-07-30 | 2021-02-12 | 欧姆龙健康医疗事业株式会社 | Measurement device, information processing apparatus, and communication system |
US20210070252A1 (en) * | 2017-06-13 | 2021-03-11 | Volkswagen Aktiengesellschaft | Method and device for authenticating a user to a transportation vehicle |
FR3105682A1 (en) * | 2019-12-20 | 2021-06-25 | E-Scopics | PROCESS AND SYSTEM FOR MANAGING DATA EXCHANGE IN THE CONTEXT OF A MEDICAL EXAMINATION |
US20210342477A1 (en) * | 2020-04-30 | 2021-11-04 | Capital One Services, Llc | Systems and methods for data access control of personal user data using a short-range transceiver |
US11595798B2 (en) * | 2019-11-01 | 2023-02-28 | Hach Company | Dynamic wireless information transmission |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6903609B2 (en) * | 2018-07-30 | 2021-07-14 | 株式会社日立製作所 | Sensor system, data collection device and data collection method |
JP7508818B2 (en) | 2020-03-18 | 2024-07-02 | 富士電機株式会社 | Equipment control system and equipment control method |
CN119301904A (en) * | 2022-06-16 | 2025-01-10 | 索尼半导体解决方案公司 | Information processing device, information processing method, program, and communication system |
JP2024030345A (en) * | 2022-08-24 | 2024-03-07 | オムロンヘルスケア株式会社 | measuring device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110022851A1 (en) * | 2008-03-25 | 2011-01-27 | Kaoru Yokota | Data encryption device |
US20130084891A1 (en) * | 2011-10-01 | 2013-04-04 | Qualcomm Incorporated | Flexible architecture for location based crowdsourcing of contextual data |
US8646060B1 (en) * | 2013-07-30 | 2014-02-04 | Mourad Ben Ayed | Method for adaptive authentication using a mobile device |
US20140081665A1 (en) * | 2012-09-11 | 2014-03-20 | Theranos, Inc. | Information management systems and methods using a biological signature |
US20150207626A1 (en) * | 2012-07-09 | 2015-07-23 | Debiotech S.A. | Communication secured between a medical device and its remote control device |
US20160117448A1 (en) * | 2013-06-28 | 2016-04-28 | Koninklijke Philips N.V. | System for managing access to medical data |
US9495397B2 (en) * | 2013-03-12 | 2016-11-15 | Intel Corporation | Sensor associated data of multiple devices based computing |
US20170201492A1 (en) * | 2016-01-13 | 2017-07-13 | Samsung Electronics Co., Ltd. | Electronic device, communication method and encrypting method thereof |
US20170325091A1 (en) * | 2016-03-30 | 2017-11-09 | Zoll Medical Corporation | Establishing Secure Communication at an Emergency Care Scene |
-
2016
- 2016-04-15 JP JP2016082533A patent/JP2017192117A/en active Pending
-
2017
- 2017-02-14 US US15/431,943 patent/US20170303119A1/en not_active Abandoned
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110022851A1 (en) * | 2008-03-25 | 2011-01-27 | Kaoru Yokota | Data encryption device |
US20130084891A1 (en) * | 2011-10-01 | 2013-04-04 | Qualcomm Incorporated | Flexible architecture for location based crowdsourcing of contextual data |
US8472980B2 (en) * | 2011-10-01 | 2013-06-25 | Qualcomm Incorporated | Flexible architecture for location based crowdsourcing of contextual data |
US20150207626A1 (en) * | 2012-07-09 | 2015-07-23 | Debiotech S.A. | Communication secured between a medical device and its remote control device |
US20140081665A1 (en) * | 2012-09-11 | 2014-03-20 | Theranos, Inc. | Information management systems and methods using a biological signature |
US9495397B2 (en) * | 2013-03-12 | 2016-11-15 | Intel Corporation | Sensor associated data of multiple devices based computing |
US20160117448A1 (en) * | 2013-06-28 | 2016-04-28 | Koninklijke Philips N.V. | System for managing access to medical data |
US8646060B1 (en) * | 2013-07-30 | 2014-02-04 | Mourad Ben Ayed | Method for adaptive authentication using a mobile device |
US20170201492A1 (en) * | 2016-01-13 | 2017-07-13 | Samsung Electronics Co., Ltd. | Electronic device, communication method and encrypting method thereof |
US20170325091A1 (en) * | 2016-03-30 | 2017-11-09 | Zoll Medical Corporation | Establishing Secure Communication at an Emergency Care Scene |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160092696A1 (en) * | 2014-09-26 | 2016-03-31 | Abhishek Guglani | Remote Server Encrypted Data Provisioning System and Methods |
US10255456B2 (en) * | 2014-09-26 | 2019-04-09 | Visa International Service Association | Remote server encrypted data provisioning system and methods |
US10643001B2 (en) * | 2014-09-26 | 2020-05-05 | Visa International Service Association | Remote server encrypted data provisioning system and methods |
US10540517B2 (en) * | 2016-07-26 | 2020-01-21 | Fujitsu Limited | Information processing apparatus, information processing system and information processing method |
US20180337803A1 (en) * | 2017-05-17 | 2018-11-22 | Hand Held Products, Inc. | Methods and apparatuses for enabling secure communication between mobile devices and a network |
US10693680B2 (en) * | 2017-05-17 | 2020-06-23 | Hand Held Products, Inc. | Methods and apparatuses for enabling secure communication between mobile devices and a network |
US12024122B2 (en) * | 2017-06-13 | 2024-07-02 | Volkswagen Aktiengesellschaft | Method and device for authenticating a user to a transportation vehicle |
US20210070252A1 (en) * | 2017-06-13 | 2021-03-11 | Volkswagen Aktiengesellschaft | Method and device for authenticating a user to a transportation vehicle |
US20210045169A1 (en) * | 2018-03-02 | 2021-02-11 | Nitto Denko Corporation | Device Pairing System And Method, And Device Communication Control System And Method |
US11716774B2 (en) * | 2018-03-02 | 2023-08-01 | Nitto Denko Corporation | Device pairing system and method, and device communication control system and method |
US11706021B2 (en) * | 2018-05-17 | 2023-07-18 | Siemens Healthcare Gmbh | Method, server and communication system for secure delivery of patient's image and consent data |
US20190356479A1 (en) * | 2018-05-17 | 2019-11-21 | Siemens Healthcare Gmbh | Method, server and communication system for secure delivery of patient's image and consent data |
US11280892B2 (en) * | 2018-07-30 | 2022-03-22 | Omron Healthcare Co., Ltd. | Measuring device, information processing device, and communication system |
CN112368975A (en) * | 2018-07-30 | 2021-02-12 | 欧姆龙健康医疗事业株式会社 | Measurement device, information processing apparatus, and communication system |
US11595798B2 (en) * | 2019-11-01 | 2023-02-28 | Hach Company | Dynamic wireless information transmission |
US11689908B2 (en) | 2019-11-01 | 2023-06-27 | Hach Company | Connectionless obtainment of dynamic information over wireless transmission |
US12108318B2 (en) | 2019-11-01 | 2024-10-01 | Hach Company | Dynamic wireless information transmission |
FR3105682A1 (en) * | 2019-12-20 | 2021-06-25 | E-Scopics | PROCESS AND SYSTEM FOR MANAGING DATA EXCHANGE IN THE CONTEXT OF A MEDICAL EXAMINATION |
US20210342477A1 (en) * | 2020-04-30 | 2021-11-04 | Capital One Services, Llc | Systems and methods for data access control of personal user data using a short-range transceiver |
US12174991B2 (en) * | 2020-04-30 | 2024-12-24 | Capital One Services, Llc | Systems and methods for data access control of personal user data using a short-range transceiver |
Also Published As
Publication number | Publication date |
---|---|
JP2017192117A (en) | 2017-10-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170303119A1 (en) | Information processing system, method of obtaining monitor information, and sensor device | |
US20240406719A1 (en) | System and Method for Secure Communication with a Network Device | |
US10164950B2 (en) | Controlling access to clinical data analyzed by remote computing resources | |
US11521175B2 (en) | Patient sensor data exchange systems and methods | |
US10263959B2 (en) | Method for communicating medical data | |
US8180060B2 (en) | Telemedical system | |
US20100122083A1 (en) | Method and apparatus for securely communicating personal health information | |
CN103971063B (en) | Transmission measure for the vital medical image content of safety | |
US10728224B1 (en) | Transmitting sensitive information securely over unsecured networks without authentication | |
JP2009111974A (en) | HEALTHCARE SYSTEM, KEY MANAGEMENT SERVER AND METHOD THEREOF, ENCRYPTION DEVICE AND METHOD THEREOF | |
CN105450650A (en) | Safety mobile electronic health record access control system | |
KR20130107837A (en) | A security system and a method for communicating data having biometric data | |
US20150254416A1 (en) | Method and system for providing medical advice | |
JP5300379B2 (en) | Management device card, measuring device, healthcare system, and biometric data communication method | |
US11924339B2 (en) | System and method for secure end-to-end electronic communication using a privately shared table of entropy | |
KR102452184B1 (en) | Method for communicating medical data | |
JP7057969B2 (en) | Management system and management method | |
JP2009232967A (en) | Massage system and massage service provision method | |
GB2509064A (en) | Method and system for distributing health data | |
JP7530752B2 (en) | Medical data management device and medical data management system | |
TWI684341B (en) | Medical interactive device | |
Sankaran et al. | Secured Medical Data Storage over Cloud for Comprehensive Treatment | |
Bhuse et al. | Secure Application for Health Monitoring | |
KR20140096245A (en) | A security system and a method for communicating data having biometric data | |
CN113409956A (en) | Remote and graded psychological assessment method and system based on mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:OGURA, TAKAO;MORIKAWA, IKUYA;SIGNING DATES FROM 20170126 TO 20170131;REEL/FRAME:041714/0328 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |